xref: /freebsd/sys/netinet/in.c (revision fbbd9655e5107c68e4e0146ff22b73d7350475bc)
1c398230bSWarner Losh /*-
2df8bae1dSRodney W. Grimes  * Copyright (c) 1982, 1986, 1991, 1993
3df8bae1dSRodney W. Grimes  *	The Regents of the University of California.  All rights reserved.
481d96ce8SMax Laier  * Copyright (C) 2001 WIDE Project.  All rights reserved.
5df8bae1dSRodney W. Grimes  *
6df8bae1dSRodney W. Grimes  * Redistribution and use in source and binary forms, with or without
7df8bae1dSRodney W. Grimes  * modification, are permitted provided that the following conditions
8df8bae1dSRodney W. Grimes  * are met:
9df8bae1dSRodney W. Grimes  * 1. Redistributions of source code must retain the above copyright
10df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer.
11df8bae1dSRodney W. Grimes  * 2. Redistributions in binary form must reproduce the above copyright
12df8bae1dSRodney W. Grimes  *    notice, this list of conditions and the following disclaimer in the
13df8bae1dSRodney W. Grimes  *    documentation and/or other materials provided with the distribution.
14*fbbd9655SWarner Losh  * 3. Neither the name of the University nor the names of its contributors
15df8bae1dSRodney W. Grimes  *    may be used to endorse or promote products derived from this software
16df8bae1dSRodney W. Grimes  *    without specific prior written permission.
17df8bae1dSRodney W. Grimes  *
18df8bae1dSRodney W. Grimes  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19df8bae1dSRodney W. Grimes  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20df8bae1dSRodney W. Grimes  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21df8bae1dSRodney W. Grimes  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22df8bae1dSRodney W. Grimes  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23df8bae1dSRodney W. Grimes  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24df8bae1dSRodney W. Grimes  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25df8bae1dSRodney W. Grimes  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26df8bae1dSRodney W. Grimes  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27df8bae1dSRodney W. Grimes  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28df8bae1dSRodney W. Grimes  * SUCH DAMAGE.
29df8bae1dSRodney W. Grimes  *
302180b925SGarrett Wollman  *	@(#)in.c	8.4 (Berkeley) 1/9/95
31df8bae1dSRodney W. Grimes  */
32df8bae1dSRodney W. Grimes 
334b421e2dSMike Silbersack #include <sys/cdefs.h>
344b421e2dSMike Silbersack __FBSDID("$FreeBSD$");
354b421e2dSMike Silbersack 
36c7ea0aa6SQing Li #include "opt_mpath.h"
3750bb1704SGleb Smirnoff 
38df8bae1dSRodney W. Grimes #include <sys/param.h>
39c3322cb9SGleb Smirnoff #include <sys/eventhandler.h>
4026f9a767SRodney W. Grimes #include <sys/systm.h>
4151a53488SBruce Evans #include <sys/sockio.h>
42df8bae1dSRodney W. Grimes #include <sys/malloc.h>
43acd3428bSRobert Watson #include <sys/priv.h>
44df8bae1dSRodney W. Grimes #include <sys/socket.h>
455ce0eb7fSBjoern A. Zeeb #include <sys/jail.h>
46f6d24a78SPoul-Henning Kamp #include <sys/kernel.h>
47cc0a3c8cSAndrey V. Elsukov #include <sys/lock.h>
485ce0eb7fSBjoern A. Zeeb #include <sys/proc.h>
49cc0a3c8cSAndrey V. Elsukov #include <sys/rmlock.h>
50f6d24a78SPoul-Henning Kamp #include <sys/sysctl.h>
51ebc90701SQing Li #include <sys/syslog.h>
52f7a39160SGleb Smirnoff #include <sys/sx.h>
53df8bae1dSRodney W. Grimes 
54df8bae1dSRodney W. Grimes #include <net/if.h>
55df813b7eSQing Li #include <net/if_var.h>
56e162ea60SGeorge V. Neville-Neil #include <net/if_arp.h>
57ebc90701SQing Li #include <net/if_dl.h>
586e6b3f7cSQing Li #include <net/if_llatbl.h>
596a800098SYoshinobu Inoue #include <net/if_types.h>
60df8bae1dSRodney W. Grimes #include <net/route.h>
61ebc90701SQing Li #include <net/vnet.h>
62df8bae1dSRodney W. Grimes 
6308b68b0eSGleb Smirnoff #include <netinet/if_ether.h>
64df8bae1dSRodney W. Grimes #include <netinet/in.h>
65df8bae1dSRodney W. Grimes #include <netinet/in_var.h>
66e43cc4aeSHajimu UMEMOTO #include <netinet/in_pcb.h>
6771498f30SBruce M Simpson #include <netinet/ip_var.h>
6808b68b0eSGleb Smirnoff #include <netinet/ip_carp.h>
69d10910e6SBruce M Simpson #include <netinet/igmp_var.h>
70eddfbb76SRobert Watson #include <netinet/udp.h>
71eddfbb76SRobert Watson #include <netinet/udp_var.h>
7255166637SPoul-Henning Kamp 
7377b89ad8SGleb Smirnoff static int in_aifaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
74338e227aSLuiz Otavio O Souza static int in_difaddr_ioctl(u_long, caddr_t, struct ifnet *, struct thread *);
756a800098SYoshinobu Inoue 
764d77a549SAlfred Perlstein static void	in_socktrim(struct sockaddr_in *);
77ec002feeSBruce M Simpson static void	in_purgemaddrs(struct ifnet *);
78df8bae1dSRodney W. Grimes 
7908b68b0eSGleb Smirnoff static VNET_DEFINE(int, nosameprefix);
8008b68b0eSGleb Smirnoff #define	V_nosameprefix			VNET(nosameprefix)
816df8a710SGleb Smirnoff SYSCTL_INT(_net_inet_ip, OID_AUTO, no_same_prefix, CTLFLAG_VNET | CTLFLAG_RW,
8208b68b0eSGleb Smirnoff 	&VNET_NAME(nosameprefix), 0,
831ae95409SGleb Smirnoff 	"Refuse to create same prefixes on different interfaces");
84477180fbSGarrett Wollman 
8582cea7e6SBjoern A. Zeeb VNET_DECLARE(struct inpcbinfo, ripcbinfo);
8682cea7e6SBjoern A. Zeeb #define	V_ripcbinfo			VNET(ripcbinfo)
8782cea7e6SBjoern A. Zeeb 
88f7a39160SGleb Smirnoff static struct sx in_control_sx;
89f7a39160SGleb Smirnoff SX_SYSINIT(in_control_sx, &in_control_sx, "in_control");
90f7a39160SGleb Smirnoff 
91df8bae1dSRodney W. Grimes /*
92df8bae1dSRodney W. Grimes  * Return 1 if an internet address is for a ``local'' host
93b365d954SGleb Smirnoff  * (one to which we have a connection).
94df8bae1dSRodney W. Grimes  */
9526f9a767SRodney W. Grimes int
96f2565d68SRobert Watson in_localaddr(struct in_addr in)
97df8bae1dSRodney W. Grimes {
98cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
99df8bae1dSRodney W. Grimes 	register u_long i = ntohl(in.s_addr);
100df8bae1dSRodney W. Grimes 	register struct in_ifaddr *ia;
101df8bae1dSRodney W. Grimes 
102cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1032d9cfabaSRobert Watson 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
1042d9cfabaSRobert Watson 		if ((i & ia->ia_subnetmask) == ia->ia_subnet) {
105cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
1062d9cfabaSRobert Watson 			return (1);
1072d9cfabaSRobert Watson 		}
1082d9cfabaSRobert Watson 	}
109cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
110df8bae1dSRodney W. Grimes 	return (0);
111df8bae1dSRodney W. Grimes }
112df8bae1dSRodney W. Grimes 
113df8bae1dSRodney W. Grimes /*
1142eccc90bSAndre Oppermann  * Return 1 if an internet address is for the local host and configured
1152eccc90bSAndre Oppermann  * on one of its interfaces.
1162eccc90bSAndre Oppermann  */
1172eccc90bSAndre Oppermann int
118f2565d68SRobert Watson in_localip(struct in_addr in)
1192eccc90bSAndre Oppermann {
120cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
1212eccc90bSAndre Oppermann 	struct in_ifaddr *ia;
1222eccc90bSAndre Oppermann 
123cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
1242eccc90bSAndre Oppermann 	LIST_FOREACH(ia, INADDR_HASH(in.s_addr), ia_hash) {
1252d9cfabaSRobert Watson 		if (IA_SIN(ia)->sin_addr.s_addr == in.s_addr) {
126cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
127460473a0SBjoern A. Zeeb 			return (1);
1282eccc90bSAndre Oppermann 		}
1292d9cfabaSRobert Watson 	}
130cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
131460473a0SBjoern A. Zeeb 	return (0);
1322eccc90bSAndre Oppermann }
1332eccc90bSAndre Oppermann 
1342eccc90bSAndre Oppermann /*
13528ebe80cSGleb Smirnoff  * Return 1 if an internet address is configured on an interface.
13628ebe80cSGleb Smirnoff  */
13728ebe80cSGleb Smirnoff int
13828ebe80cSGleb Smirnoff in_ifhasaddr(struct ifnet *ifp, struct in_addr in)
13928ebe80cSGleb Smirnoff {
14028ebe80cSGleb Smirnoff 	struct ifaddr *ifa;
14128ebe80cSGleb Smirnoff 	struct in_ifaddr *ia;
14228ebe80cSGleb Smirnoff 
14328ebe80cSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
14428ebe80cSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
14528ebe80cSGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
14628ebe80cSGleb Smirnoff 			continue;
14728ebe80cSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
14828ebe80cSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == in.s_addr) {
14928ebe80cSGleb Smirnoff 			IF_ADDR_RUNLOCK(ifp);
15028ebe80cSGleb Smirnoff 			return (1);
15128ebe80cSGleb Smirnoff 		}
15228ebe80cSGleb Smirnoff 	}
15328ebe80cSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
15428ebe80cSGleb Smirnoff 
15528ebe80cSGleb Smirnoff 	return (0);
15628ebe80cSGleb Smirnoff }
15728ebe80cSGleb Smirnoff 
15828ebe80cSGleb Smirnoff /*
159f7a39160SGleb Smirnoff  * Return a reference to the interface address which is different to
160f7a39160SGleb Smirnoff  * the supplied one but with same IP address value.
161f7a39160SGleb Smirnoff  */
162f7a39160SGleb Smirnoff static struct in_ifaddr *
163f7a39160SGleb Smirnoff in_localip_more(struct in_ifaddr *ia)
164f7a39160SGleb Smirnoff {
165cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
166f7a39160SGleb Smirnoff 	in_addr_t in = IA_SIN(ia)->sin_addr.s_addr;
167f7a39160SGleb Smirnoff 	struct in_ifaddr *it;
168f7a39160SGleb Smirnoff 
169cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
170f7a39160SGleb Smirnoff 	LIST_FOREACH(it, INADDR_HASH(in), ia_hash) {
171f7a39160SGleb Smirnoff 		if (it != ia && IA_SIN(it)->sin_addr.s_addr == in) {
172f7a39160SGleb Smirnoff 			ifa_ref(&it->ia_ifa);
173cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
174f7a39160SGleb Smirnoff 			return (it);
175f7a39160SGleb Smirnoff 		}
176f7a39160SGleb Smirnoff 	}
177cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
178f7a39160SGleb Smirnoff 
179f7a39160SGleb Smirnoff 	return (NULL);
180f7a39160SGleb Smirnoff }
181f7a39160SGleb Smirnoff 
182f7a39160SGleb Smirnoff /*
183df8bae1dSRodney W. Grimes  * Determine whether an IP address is in a reserved set of addresses
184df8bae1dSRodney W. Grimes  * that may not be forwarded, or whether datagrams to that destination
185df8bae1dSRodney W. Grimes  * may be forwarded.
186df8bae1dSRodney W. Grimes  */
18726f9a767SRodney W. Grimes int
188f2565d68SRobert Watson in_canforward(struct in_addr in)
189df8bae1dSRodney W. Grimes {
190df8bae1dSRodney W. Grimes 	register u_long i = ntohl(in.s_addr);
191df8bae1dSRodney W. Grimes 	register u_long net;
192df8bae1dSRodney W. Grimes 
193f8429ca2SBruce M Simpson 	if (IN_EXPERIMENTAL(i) || IN_MULTICAST(i) || IN_LINKLOCAL(i))
194df8bae1dSRodney W. Grimes 		return (0);
195df8bae1dSRodney W. Grimes 	if (IN_CLASSA(i)) {
196df8bae1dSRodney W. Grimes 		net = i & IN_CLASSA_NET;
197df8bae1dSRodney W. Grimes 		if (net == 0 || net == (IN_LOOPBACKNET << IN_CLASSA_NSHIFT))
198df8bae1dSRodney W. Grimes 			return (0);
199df8bae1dSRodney W. Grimes 	}
200df8bae1dSRodney W. Grimes 	return (1);
201df8bae1dSRodney W. Grimes }
202df8bae1dSRodney W. Grimes 
203df8bae1dSRodney W. Grimes /*
204df8bae1dSRodney W. Grimes  * Trim a mask in a sockaddr
205df8bae1dSRodney W. Grimes  */
2060312fbe9SPoul-Henning Kamp static void
207f2565d68SRobert Watson in_socktrim(struct sockaddr_in *ap)
208df8bae1dSRodney W. Grimes {
209df8bae1dSRodney W. Grimes     register char *cplim = (char *) &ap->sin_addr;
210df8bae1dSRodney W. Grimes     register char *cp = (char *) (&ap->sin_addr + 1);
211df8bae1dSRodney W. Grimes 
212df8bae1dSRodney W. Grimes     ap->sin_len = 0;
213df00058dSGarrett Wollman     while (--cp >= cplim)
214df8bae1dSRodney W. Grimes 	if (*cp) {
215df8bae1dSRodney W. Grimes 	    (ap)->sin_len = cp - (char *) (ap) + 1;
216df8bae1dSRodney W. Grimes 	    break;
217df8bae1dSRodney W. Grimes 	}
218df8bae1dSRodney W. Grimes }
219df8bae1dSRodney W. Grimes 
220df8bae1dSRodney W. Grimes /*
221df8bae1dSRodney W. Grimes  * Generic internet control operations (ioctl's).
222df8bae1dSRodney W. Grimes  */
22326f9a767SRodney W. Grimes int
224f2565d68SRobert Watson in_control(struct socket *so, u_long cmd, caddr_t data, struct ifnet *ifp,
225f2565d68SRobert Watson     struct thread *td)
226df8bae1dSRodney W. Grimes {
227f7a39160SGleb Smirnoff 	struct ifreq *ifr = (struct ifreq *)data;
228f7a39160SGleb Smirnoff 	struct sockaddr_in *addr = (struct sockaddr_in *)&ifr->ifr_addr;
229821b5cafSGleb Smirnoff 	struct ifaddr *ifa;
230f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
231f7a39160SGleb Smirnoff 	int error;
232f7a39160SGleb Smirnoff 
233f7a39160SGleb Smirnoff 	if (ifp == NULL)
234f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
23571212473SGleb Smirnoff 
23671212473SGleb Smirnoff 	/*
237f7a39160SGleb Smirnoff 	 * Filter out 4 ioctls we implement directly.  Forward the rest
238f7a39160SGleb Smirnoff 	 * to specific functions and ifp->if_ioctl().
239bbb3fb61SRobert Watson 	 */
2406a800098SYoshinobu Inoue 	switch (cmd) {
241bbb3fb61SRobert Watson 	case SIOCGIFADDR:
242bbb3fb61SRobert Watson 	case SIOCGIFBRDADDR:
243bbb3fb61SRobert Watson 	case SIOCGIFDSTADDR:
244bbb3fb61SRobert Watson 	case SIOCGIFNETMASK:
245f7a39160SGleb Smirnoff 		break;
2466d00fd9cSGleb Smirnoff 	case SIOCDIFADDR:
247f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
248338e227aSLuiz Otavio O Souza 		error = in_difaddr_ioctl(cmd, data, ifp, td);
249f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
250f7a39160SGleb Smirnoff 		return (error);
25177b89ad8SGleb Smirnoff 	case OSIOCAIFADDR:	/* 9.x compat */
2526d00fd9cSGleb Smirnoff 	case SIOCAIFADDR:
253f7a39160SGleb Smirnoff 		sx_xlock(&in_control_sx);
25477b89ad8SGleb Smirnoff 		error = in_aifaddr_ioctl(cmd, data, ifp, td);
255f7a39160SGleb Smirnoff 		sx_xunlock(&in_control_sx);
256f7a39160SGleb Smirnoff 		return (error);
257bbb3fb61SRobert Watson 	case SIOCSIFADDR:
258bbb3fb61SRobert Watson 	case SIOCSIFBRDADDR:
259bbb3fb61SRobert Watson 	case SIOCSIFDSTADDR:
260bbb3fb61SRobert Watson 	case SIOCSIFNETMASK:
26156cf9dc1SGleb Smirnoff 		/* We no longer support that old commands. */
2626d00fd9cSGleb Smirnoff 		return (EINVAL);
263bbb3fb61SRobert Watson 	default:
264f7a39160SGleb Smirnoff 		if (ifp->if_ioctl == NULL)
265bbb3fb61SRobert Watson 			return (EOPNOTSUPP);
266bbb3fb61SRobert Watson 		return ((*ifp->if_ioctl)(ifp, cmd, data));
2676a800098SYoshinobu Inoue 	}
2686a800098SYoshinobu Inoue 
269821b5cafSGleb Smirnoff 	if (addr->sin_addr.s_addr != INADDR_ANY &&
270821b5cafSGleb Smirnoff 	    prison_check_ip4(td->td_ucred, &addr->sin_addr) != 0)
271821b5cafSGleb Smirnoff 		return (EADDRNOTAVAIL);
272821b5cafSGleb Smirnoff 
273cf7b18f1SRobert Watson 	/*
274a7f77a39SXin LI 	 * Find address for this interface, if it exists.  If an
275a7f77a39SXin LI 	 * address was specified, find that one instead of the
276a7f77a39SXin LI 	 * first one on the interface, if possible.
277df8bae1dSRodney W. Grimes 	 */
278821b5cafSGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
279821b5cafSGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
2809706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
2819706c950SGleb Smirnoff 			continue;
282821b5cafSGleb Smirnoff 		ia = (struct in_ifaddr *)ifa;
283821b5cafSGleb Smirnoff 		if (ia->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr)
284df8bae1dSRodney W. Grimes 			break;
285ca925d9cSJonathan Lemon 	}
286a7f77a39SXin LI 	if (ifa == NULL)
287a7f77a39SXin LI 		TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
288a7f77a39SXin LI 			if (ifa->ifa_addr->sa_family == AF_INET) {
289a7f77a39SXin LI 				ia = (struct in_ifaddr *)ifa;
290a7f77a39SXin LI 				if (prison_check_ip4(td->td_ucred,
291a7f77a39SXin LI 				    &ia->ia_addr.sin_addr) == 0)
292a7f77a39SXin LI 					break;
293a7f77a39SXin LI 			}
294f7a39160SGleb Smirnoff 
295821b5cafSGleb Smirnoff 	if (ifa == NULL) {
296821b5cafSGleb Smirnoff 		IF_ADDR_RUNLOCK(ifp);
297f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
298ac0aa473SBill Fenner 	}
299df8bae1dSRodney W. Grimes 
300588885f2SRobert Watson 	error = 0;
301df8bae1dSRodney W. Grimes 	switch (cmd) {
302f7a39160SGleb Smirnoff 	case SIOCGIFADDR:
303f7a39160SGleb Smirnoff 		*addr = ia->ia_addr;
304f7a39160SGleb Smirnoff 		break;
3058c0fec80SRobert Watson 
306f7a39160SGleb Smirnoff 	case SIOCGIFBRDADDR:
307f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_BROADCAST) == 0) {
308f7a39160SGleb Smirnoff 			error = EINVAL;
309df8bae1dSRodney W. Grimes 			break;
310df8bae1dSRodney W. Grimes 		}
311f7a39160SGleb Smirnoff 		*addr = ia->ia_broadaddr;
312f7a39160SGleb Smirnoff 		break;
313f7a39160SGleb Smirnoff 
314f7a39160SGleb Smirnoff 	case SIOCGIFDSTADDR:
315f7a39160SGleb Smirnoff 		if ((ifp->if_flags & IFF_POINTOPOINT) == 0) {
316f7a39160SGleb Smirnoff 			error = EINVAL;
317f7a39160SGleb Smirnoff 			break;
318f7a39160SGleb Smirnoff 		}
319f7a39160SGleb Smirnoff 		*addr = ia->ia_dstaddr;
320f7a39160SGleb Smirnoff 		break;
321f7a39160SGleb Smirnoff 
322f7a39160SGleb Smirnoff 	case SIOCGIFNETMASK:
323f7a39160SGleb Smirnoff 		*addr = ia->ia_sockmask;
324f7a39160SGleb Smirnoff 		break;
325f7a39160SGleb Smirnoff 	}
326f7a39160SGleb Smirnoff 
327821b5cafSGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
328f7a39160SGleb Smirnoff 
329f7a39160SGleb Smirnoff 	return (error);
3301067217dSGarrett Wollman }
331f7a39160SGleb Smirnoff 
332f7a39160SGleb Smirnoff static int
33377b89ad8SGleb Smirnoff in_aifaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
334f7a39160SGleb Smirnoff {
335f7a39160SGleb Smirnoff 	const struct in_aliasreq *ifra = (struct in_aliasreq *)data;
336f7a39160SGleb Smirnoff 	const struct sockaddr_in *addr = &ifra->ifra_addr;
337f7a39160SGleb Smirnoff 	const struct sockaddr_in *broadaddr = &ifra->ifra_broadaddr;
338f7a39160SGleb Smirnoff 	const struct sockaddr_in *mask = &ifra->ifra_mask;
339f7a39160SGleb Smirnoff 	const struct sockaddr_in *dstaddr = &ifra->ifra_dstaddr;
34077b89ad8SGleb Smirnoff 	const int vhid = (cmd == SIOCAIFADDR) ? ifra->ifra_vhid : 0;
341f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
342f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
343f7a39160SGleb Smirnoff 	bool iaIsFirst;
344f7a39160SGleb Smirnoff 	int error = 0;
345f7a39160SGleb Smirnoff 
346f7a39160SGleb Smirnoff 	error = priv_check(td, PRIV_NET_ADDIFADDR);
347f7a39160SGleb Smirnoff 	if (error)
348f7a39160SGleb Smirnoff 		return (error);
349f7a39160SGleb Smirnoff 
350f7a39160SGleb Smirnoff 	/*
351f7a39160SGleb Smirnoff 	 * ifra_addr must be present and be of INET family.
352f7a39160SGleb Smirnoff 	 * ifra_broadaddr/ifra_dstaddr and ifra_mask are optional.
353f7a39160SGleb Smirnoff 	 */
354f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
355f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
356f7a39160SGleb Smirnoff 		return (EINVAL);
357f7a39160SGleb Smirnoff 	if (broadaddr->sin_len != 0 &&
358f7a39160SGleb Smirnoff 	    (broadaddr->sin_len != sizeof(struct sockaddr_in) ||
359f7a39160SGleb Smirnoff 	    broadaddr->sin_family != AF_INET))
360f7a39160SGleb Smirnoff 		return (EINVAL);
361f7a39160SGleb Smirnoff 	if (mask->sin_len != 0 &&
362f7a39160SGleb Smirnoff 	    (mask->sin_len != sizeof(struct sockaddr_in) ||
363f7a39160SGleb Smirnoff 	    mask->sin_family != AF_INET))
364f7a39160SGleb Smirnoff 		return (EINVAL);
365f7a39160SGleb Smirnoff 	if ((ifp->if_flags & IFF_POINTOPOINT) &&
366f7a39160SGleb Smirnoff 	    (dstaddr->sin_len != sizeof(struct sockaddr_in) ||
367f7a39160SGleb Smirnoff 	     dstaddr->sin_addr.s_addr == INADDR_ANY))
368f7a39160SGleb Smirnoff 		return (EDESTADDRREQ);
369f7a39160SGleb Smirnoff 	if (vhid > 0 && carp_attach_p == NULL)
370f7a39160SGleb Smirnoff 		return (EPROTONOSUPPORT);
371f7a39160SGleb Smirnoff 
372f7a39160SGleb Smirnoff 	/*
373f7a39160SGleb Smirnoff 	 * See whether address already exist.
374f7a39160SGleb Smirnoff 	 */
375f7a39160SGleb Smirnoff 	iaIsFirst = true;
376f7a39160SGleb Smirnoff 	ia = NULL;
377f7a39160SGleb Smirnoff 	IF_ADDR_RLOCK(ifp);
378f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
3799706c950SGleb Smirnoff 		struct in_ifaddr *it;
380f7a39160SGleb Smirnoff 
3819706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
382f7a39160SGleb Smirnoff 			continue;
383f7a39160SGleb Smirnoff 
3849706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
385f7a39160SGleb Smirnoff 		iaIsFirst = false;
386f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
387f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &addr->sin_addr) == 0)
388f7a39160SGleb Smirnoff 			ia = it;
3891067217dSGarrett Wollman 	}
390f7a39160SGleb Smirnoff 	IF_ADDR_RUNLOCK(ifp);
391f7a39160SGleb Smirnoff 
392f7a39160SGleb Smirnoff 	if (ia != NULL)
393338e227aSLuiz Otavio O Souza 		(void )in_difaddr_ioctl(cmd, data, ifp, td);
394f7a39160SGleb Smirnoff 
39546758960SGleb Smirnoff 	ifa = ifa_alloc(sizeof(struct in_ifaddr), M_WAITOK);
39646758960SGleb Smirnoff 	ia = (struct in_ifaddr *)ifa;
39759562606SGarrett Wollman 	ifa->ifa_addr = (struct sockaddr *)&ia->ia_addr;
39859562606SGarrett Wollman 	ifa->ifa_dstaddr = (struct sockaddr *)&ia->ia_dstaddr;
39959562606SGarrett Wollman 	ifa->ifa_netmask = (struct sockaddr *)&ia->ia_sockmask;
4002d9db0bcSEric van Gyzen 	callout_init_rw(&ia->ia_garp_timer, &ifp->if_addr_lock,
4012d9db0bcSEric van Gyzen 	    CALLOUT_RETURNUNLOCKED);
40219fc74fbSJeffrey Hsu 
403f7a39160SGleb Smirnoff 	ia->ia_ifp = ifp;
404f7a39160SGleb Smirnoff 	ia->ia_addr = *addr;
405f7a39160SGleb Smirnoff 	if (mask->sin_len != 0) {
406f7a39160SGleb Smirnoff 		ia->ia_sockmask = *mask;
407f7a39160SGleb Smirnoff 		ia->ia_subnetmask = ntohl(ia->ia_sockmask.sin_addr.s_addr);
408f7a39160SGleb Smirnoff 	} else {
409f7a39160SGleb Smirnoff 		in_addr_t i = ntohl(addr->sin_addr.s_addr);
410f7a39160SGleb Smirnoff 
411f7a39160SGleb Smirnoff 		/*
412f7a39160SGleb Smirnoff 	 	 * Be compatible with network classes, if netmask isn't
413f7a39160SGleb Smirnoff 		 * supplied, guess it based on classes.
414f7a39160SGleb Smirnoff 	 	 */
415f7a39160SGleb Smirnoff 		if (IN_CLASSA(i))
416f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSA_NET;
417f7a39160SGleb Smirnoff 		else if (IN_CLASSB(i))
418f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSB_NET;
419f7a39160SGleb Smirnoff 		else
420f7a39160SGleb Smirnoff 			ia->ia_subnetmask = IN_CLASSC_NET;
421f7a39160SGleb Smirnoff 		ia->ia_sockmask.sin_addr.s_addr = htonl(ia->ia_subnetmask);
422f7a39160SGleb Smirnoff 	}
423f7a39160SGleb Smirnoff 	ia->ia_subnet = ntohl(addr->sin_addr.s_addr) & ia->ia_subnetmask;
424f7a39160SGleb Smirnoff 	in_socktrim(&ia->ia_sockmask);
425f7a39160SGleb Smirnoff 
426df8bae1dSRodney W. Grimes 	if (ifp->if_flags & IFF_BROADCAST) {
427f7a39160SGleb Smirnoff 		if (broadaddr->sin_len != 0) {
428f7a39160SGleb Smirnoff 			ia->ia_broadaddr = *broadaddr;
429f7a39160SGleb Smirnoff 		} else if (ia->ia_subnetmask == IN_RFC3021_MASK) {
430f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr = INADDR_BROADCAST;
431f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
432f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_family = AF_INET;
433f7a39160SGleb Smirnoff 		} else {
434f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_addr.s_addr =
435f7a39160SGleb Smirnoff 			    htonl(ia->ia_subnet | ~ia->ia_subnetmask);
436f7a39160SGleb Smirnoff 			ia->ia_broadaddr.sin_len = sizeof(struct sockaddr_in);
437df8bae1dSRodney W. Grimes 			ia->ia_broadaddr.sin_family = AF_INET;
438df8bae1dSRodney W. Grimes 		}
439f7a39160SGleb Smirnoff 	}
440f7a39160SGleb Smirnoff 
441f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_POINTOPOINT)
442f7a39160SGleb Smirnoff 		ia->ia_dstaddr = *dstaddr;
443f7a39160SGleb Smirnoff 
444f7a39160SGleb Smirnoff 	/* XXXGL: rtinit() needs this strange assignment. */
445f7a39160SGleb Smirnoff 	if (ifp->if_flags & IFF_LOOPBACK)
446f7a39160SGleb Smirnoff                 ia->ia_dstaddr = ia->ia_addr;
447f3d30eb2SGleb Smirnoff 
4485af464bbSSteven Hartland 	if (vhid != 0) {
4495af464bbSSteven Hartland 		error = (*carp_attach_p)(&ia->ia_ifa, vhid);
4505af464bbSSteven Hartland 		if (error)
4515af464bbSSteven Hartland 			return (error);
4525af464bbSSteven Hartland 	}
4535af464bbSSteven Hartland 
454a49b317cSAlexander V. Chernikov 	/* if_addrhead is already referenced by ifa_alloc() */
455137f91e8SJohn Baldwin 	IF_ADDR_WLOCK(ifp);
4568021456aSRobert Watson 	TAILQ_INSERT_TAIL(&ifp->if_addrhead, ifa, ifa_link);
457137f91e8SJohn Baldwin 	IF_ADDR_WUNLOCK(ifp);
458f7a39160SGleb Smirnoff 
4598c0fec80SRobert Watson 	ifa_ref(ifa);			/* in_ifaddrhead */
4602d9cfabaSRobert Watson 	IN_IFADDR_WLOCK();
461603724d3SBjoern A. Zeeb 	TAILQ_INSERT_TAIL(&V_in_ifaddrhead, ia, ia_link);
462f7a39160SGleb Smirnoff 	LIST_INSERT_HEAD(INADDR_HASH(ia->ia_addr.sin_addr.s_addr), ia, ia_hash);
4632d9cfabaSRobert Watson 	IN_IFADDR_WUNLOCK();
464df8bae1dSRodney W. Grimes 
465f7a39160SGleb Smirnoff 	/*
466f7a39160SGleb Smirnoff 	 * Give the interface a chance to initialize
467f7a39160SGleb Smirnoff 	 * if this is its first address,
468f7a39160SGleb Smirnoff 	 * and to validate the address if necessary.
469f7a39160SGleb Smirnoff 	 */
470d34165f7SSteven Hartland 	if (ifp->if_ioctl != NULL) {
471f7a39160SGleb Smirnoff 		error = (*ifp->if_ioctl)(ifp, SIOCSIFADDR, (caddr_t)ia);
472f7a39160SGleb Smirnoff 		if (error)
4735af464bbSSteven Hartland 			goto fail1;
474d34165f7SSteven Hartland 	}
475f7a39160SGleb Smirnoff 
476f7a39160SGleb Smirnoff 	/*
477f7a39160SGleb Smirnoff 	 * Add route for the network.
478f7a39160SGleb Smirnoff 	 */
479f7a39160SGleb Smirnoff 	if (vhid == 0) {
480f7a39160SGleb Smirnoff 		int flags = RTF_UP;
481f7a39160SGleb Smirnoff 
482f7a39160SGleb Smirnoff 		if (ifp->if_flags & (IFF_LOOPBACK|IFF_POINTOPOINT))
483f7a39160SGleb Smirnoff 			flags |= RTF_HOST;
484f7a39160SGleb Smirnoff 
485f7a39160SGleb Smirnoff 		error = in_addprefix(ia, flags);
486f7a39160SGleb Smirnoff 		if (error)
4875af464bbSSteven Hartland 			goto fail1;
488df8bae1dSRodney W. Grimes 	}
489df8bae1dSRodney W. Grimes 
490588885f2SRobert Watson 	/*
491f7a39160SGleb Smirnoff 	 * Add a loopback route to self.
492588885f2SRobert Watson 	 */
493f7a39160SGleb Smirnoff 	if (vhid == 0 && (ifp->if_flags & IFF_LOOPBACK) == 0 &&
494c1f7c3f5SGleb Smirnoff 	    ia->ia_addr.sin_addr.s_addr != INADDR_ANY &&
495c1f7c3f5SGleb Smirnoff 	    !((ifp->if_flags & IFF_POINTOPOINT) &&
496c1f7c3f5SGleb Smirnoff 	     ia->ia_dstaddr.sin_addr.s_addr == ia->ia_addr.sin_addr.s_addr)) {
497f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
498df8bae1dSRodney W. Grimes 
499f7a39160SGleb Smirnoff 		eia = in_localip_more(ia);
500f7a39160SGleb Smirnoff 
501f7a39160SGleb Smirnoff 		if (eia == NULL) {
502f7a39160SGleb Smirnoff 			error = ifa_add_loopback_route((struct ifaddr *)ia,
503f7a39160SGleb Smirnoff 			    (struct sockaddr *)&ia->ia_addr);
504f7a39160SGleb Smirnoff 			if (error)
5055af464bbSSteven Hartland 				goto fail2;
506f7a39160SGleb Smirnoff 		} else
507f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
508588885f2SRobert Watson 	}
509df8bae1dSRodney W. Grimes 
510f7a39160SGleb Smirnoff 	if (iaIsFirst && (ifp->if_flags & IFF_MULTICAST)) {
511f7a39160SGleb Smirnoff 		struct in_addr allhosts_addr;
512f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
513df8bae1dSRodney W. Grimes 
514c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
515f7a39160SGleb Smirnoff 		allhosts_addr.s_addr = htonl(INADDR_ALLHOSTS_GROUP);
516df8bae1dSRodney W. Grimes 
517f7a39160SGleb Smirnoff 		error = in_joingroup(ifp, &allhosts_addr, NULL,
518f7a39160SGleb Smirnoff 			&ii->ii_allhosts);
519f7a39160SGleb Smirnoff 	}
520f7a39160SGleb Smirnoff 
521f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
522f7a39160SGleb Smirnoff 
523f7a39160SGleb Smirnoff 	return (error);
524f7a39160SGleb Smirnoff 
5255af464bbSSteven Hartland fail2:
526f7a39160SGleb Smirnoff 	if (vhid == 0)
527f7a39160SGleb Smirnoff 		(void )in_scrubprefix(ia, LLE_STATIC);
528f7a39160SGleb Smirnoff 
5295af464bbSSteven Hartland fail1:
530f7a39160SGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
531338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa, false);
532f7a39160SGleb Smirnoff 
533f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
534f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
535f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
536a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
537f7a39160SGleb Smirnoff 
538f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
539f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
540f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
541f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
542a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
543f7a39160SGleb Smirnoff 
544f7a39160SGleb Smirnoff 	return (error);
545f7a39160SGleb Smirnoff }
546f7a39160SGleb Smirnoff 
547f7a39160SGleb Smirnoff static int
548338e227aSLuiz Otavio O Souza in_difaddr_ioctl(u_long cmd, caddr_t data, struct ifnet *ifp, struct thread *td)
549f7a39160SGleb Smirnoff {
550f7a39160SGleb Smirnoff 	const struct ifreq *ifr = (struct ifreq *)data;
5516224cd89SNathan Whitehorn 	const struct sockaddr_in *addr = (const struct sockaddr_in *)
5526224cd89SNathan Whitehorn 	    &ifr->ifr_addr;
553f7a39160SGleb Smirnoff 	struct ifaddr *ifa;
554f7a39160SGleb Smirnoff 	struct in_ifaddr *ia;
555f7a39160SGleb Smirnoff 	bool deleteAny, iaIsLast;
556f7a39160SGleb Smirnoff 	int error;
557f7a39160SGleb Smirnoff 
558f7a39160SGleb Smirnoff 	if (td != NULL) {
559f7a39160SGleb Smirnoff 		error = priv_check(td, PRIV_NET_DELIFADDR);
560f7a39160SGleb Smirnoff 		if (error)
561f7a39160SGleb Smirnoff 			return (error);
562f7a39160SGleb Smirnoff 	}
563f7a39160SGleb Smirnoff 
564f7a39160SGleb Smirnoff 	if (addr->sin_len != sizeof(struct sockaddr_in) ||
565f7a39160SGleb Smirnoff 	    addr->sin_family != AF_INET)
566f7a39160SGleb Smirnoff 		deleteAny = true;
567f7a39160SGleb Smirnoff 	else
568f7a39160SGleb Smirnoff 		deleteAny = false;
569f7a39160SGleb Smirnoff 
570f7a39160SGleb Smirnoff 	iaIsLast = true;
571f7a39160SGleb Smirnoff 	ia = NULL;
572f7a39160SGleb Smirnoff 	IF_ADDR_WLOCK(ifp);
573f7a39160SGleb Smirnoff 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
5749706c950SGleb Smirnoff 		struct in_ifaddr *it;
575f7a39160SGleb Smirnoff 
5769706c950SGleb Smirnoff 		if (ifa->ifa_addr->sa_family != AF_INET)
577f7a39160SGleb Smirnoff 			continue;
578f7a39160SGleb Smirnoff 
5799706c950SGleb Smirnoff 		it = (struct in_ifaddr *)ifa;
580f7a39160SGleb Smirnoff 		if (deleteAny && ia == NULL && (td == NULL ||
581f7a39160SGleb Smirnoff 		    prison_check_ip4(td->td_ucred, &it->ia_addr.sin_addr) == 0))
582f7a39160SGleb Smirnoff 			ia = it;
583f7a39160SGleb Smirnoff 
584f7a39160SGleb Smirnoff 		if (it->ia_addr.sin_addr.s_addr == addr->sin_addr.s_addr &&
585f7a39160SGleb Smirnoff 		    (td == NULL || prison_check_ip4(td->td_ucred,
586f7a39160SGleb Smirnoff 		    &addr->sin_addr) == 0))
587f7a39160SGleb Smirnoff 			ia = it;
588f7a39160SGleb Smirnoff 
589f7a39160SGleb Smirnoff 		if (it != ia)
590f7a39160SGleb Smirnoff 			iaIsLast = false;
591f7a39160SGleb Smirnoff 	}
592f7a39160SGleb Smirnoff 
593f7a39160SGleb Smirnoff 	if (ia == NULL) {
594f7a39160SGleb Smirnoff 		IF_ADDR_WUNLOCK(ifp);
595f7a39160SGleb Smirnoff 		return (EADDRNOTAVAIL);
596f7a39160SGleb Smirnoff 	}
597f7a39160SGleb Smirnoff 
598f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&ifp->if_addrhead, &ia->ia_ifa, ifa_link);
599f7a39160SGleb Smirnoff 	IF_ADDR_WUNLOCK(ifp);
600f7a39160SGleb Smirnoff 	ifa_free(&ia->ia_ifa);		/* if_addrhead */
601f7a39160SGleb Smirnoff 
602f7a39160SGleb Smirnoff 	IN_IFADDR_WLOCK();
603f7a39160SGleb Smirnoff 	TAILQ_REMOVE(&V_in_ifaddrhead, ia, ia_link);
604f7a39160SGleb Smirnoff 	LIST_REMOVE(ia, ia_hash);
605f7a39160SGleb Smirnoff 	IN_IFADDR_WUNLOCK();
606f7a39160SGleb Smirnoff 
607089cdfadSRuslan Ermilov 	/*
608237bf7f7SGleb Smirnoff 	 * in_scrubprefix() kills the interface route.
609089cdfadSRuslan Ermilov 	 */
610237bf7f7SGleb Smirnoff 	in_scrubprefix(ia, LLE_STATIC);
611588885f2SRobert Watson 
612c655b7c4SDavid Greenman 	/*
613089cdfadSRuslan Ermilov 	 * in_ifadown gets rid of all the rest of
614089cdfadSRuslan Ermilov 	 * the routes.  This is not quite the right
615089cdfadSRuslan Ermilov 	 * thing to do, but at least if we are running
616089cdfadSRuslan Ermilov 	 * a routing process they will come back.
617089cdfadSRuslan Ermilov 	 */
61891854268SRuslan Ermilov 	in_ifadown(&ia->ia_ifa, 1);
6190f02fdacSBrian Somers 
62008b68b0eSGleb Smirnoff 	if (ia->ia_ifa.ifa_carp)
621338e227aSLuiz Otavio O Souza 		(*carp_detach_p)(&ia->ia_ifa,
622338e227aSLuiz Otavio O Souza 		    (cmd == SIOCDIFADDR) ? false : true);
62308b68b0eSGleb Smirnoff 
624f7e083afSBruce M Simpson 	/*
625f7e083afSBruce M Simpson 	 * If this is the last IPv4 address configured on this
626f7e083afSBruce M Simpson 	 * interface, leave the all-hosts group.
627d10910e6SBruce M Simpson 	 * No state-change report need be transmitted.
628f7e083afSBruce M Simpson 	 */
629f7a39160SGleb Smirnoff 	if (iaIsLast && (ifp->if_flags & IFF_MULTICAST)) {
630f7a39160SGleb Smirnoff 		struct in_ifinfo *ii;
631f7a39160SGleb Smirnoff 
632c75aa354SBruce M Simpson 		ii = ((struct in_ifinfo *)ifp->if_afdata[AF_INET]);
633f7e083afSBruce M Simpson 		IN_MULTI_LOCK();
634d10910e6SBruce M Simpson 		if (ii->ii_allhosts) {
6356d00fd9cSGleb Smirnoff 			(void)in_leavegroup_locked(ii->ii_allhosts, NULL);
636d10910e6SBruce M Simpson 			ii->ii_allhosts = NULL;
637d10910e6SBruce M Simpson 		}
638f7e083afSBruce M Simpson 		IN_MULTI_UNLOCK();
639f7a39160SGleb Smirnoff 	}
6406d00fd9cSGleb Smirnoff 
6412d9db0bcSEric van Gyzen 	IF_ADDR_WLOCK(ifp);
6422d9db0bcSEric van Gyzen 	if (callout_stop(&ia->ia_garp_timer) == 1) {
6432d9db0bcSEric van Gyzen 		ifa_free(&ia->ia_ifa);
6442d9db0bcSEric van Gyzen 	}
6452d9db0bcSEric van Gyzen 	IF_ADDR_WUNLOCK(ifp);
6462d9db0bcSEric van Gyzen 
647f7a39160SGleb Smirnoff 	EVENTHANDLER_INVOKE(ifaddr_event, ifp);
648a49b317cSAlexander V. Chernikov 	ifa_free(&ia->ia_ifa);		/* in_ifaddrhead */
649f7a39160SGleb Smirnoff 
650f7a39160SGleb Smirnoff 	return (0);
651df8bae1dSRodney W. Grimes }
652df8bae1dSRodney W. Grimes 
65348321abeSMax Laier #define rtinitflags(x) \
65448321abeSMax Laier 	((((x)->ia_ifp->if_flags & (IFF_LOOPBACK | IFF_POINTOPOINT)) != 0) \
65548321abeSMax Laier 	    ? RTF_HOST : 0)
656ccbb9c35SQing Li 
657ccbb9c35SQing Li /*
658fbdd20a1SMatt Jacob  * Check if we have a route for the given prefix already or add one accordingly.
65948321abeSMax Laier  */
66008b68b0eSGleb Smirnoff int
661f2565d68SRobert Watson in_addprefix(struct in_ifaddr *target, int flags)
66248321abeSMax Laier {
663cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
66448321abeSMax Laier 	struct in_ifaddr *ia;
665bfb26eecSGleb Smirnoff 	struct in_addr prefix, mask, p, m;
6660cfee0c2SAlan Somers 	int error;
66748321abeSMax Laier 
668fbdd20a1SMatt Jacob 	if ((flags & RTF_HOST) != 0) {
66948321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
670fbdd20a1SMatt Jacob 		mask.s_addr = 0;
671fbdd20a1SMatt Jacob 	} else {
67248321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
67348321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
67448321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
67548321abeSMax Laier 	}
67648321abeSMax Laier 
677cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
6780cfee0c2SAlan Somers 	/* Look for an existing address with the same prefix, mask, and fib */
679603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
680bfb26eecSGleb Smirnoff 		if (rtinitflags(ia)) {
68172366606SKevin Lo 			p = ia->ia_dstaddr.sin_addr;
68248321abeSMax Laier 
68348321abeSMax Laier 			if (prefix.s_addr != p.s_addr)
68448321abeSMax Laier 				continue;
685bfb26eecSGleb Smirnoff 		} else {
686bfb26eecSGleb Smirnoff 			p = ia->ia_addr.sin_addr;
687bfb26eecSGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
688bfb26eecSGleb Smirnoff 			p.s_addr &= m.s_addr;
689bfb26eecSGleb Smirnoff 
690bfb26eecSGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
691bfb26eecSGleb Smirnoff 			    mask.s_addr != m.s_addr)
692bfb26eecSGleb Smirnoff 				continue;
693bfb26eecSGleb Smirnoff 		}
6940cfee0c2SAlan Somers 		if (target->ia_ifp->if_fib != ia->ia_ifp->if_fib)
6950cfee0c2SAlan Somers 			continue;
69648321abeSMax Laier 
69748321abeSMax Laier 		/*
69848321abeSMax Laier 		 * If we got a matching prefix route inserted by other
69948321abeSMax Laier 		 * interface address, we are done here.
70048321abeSMax Laier 		 */
7011ae95409SGleb Smirnoff 		if (ia->ia_flags & IFA_ROUTE) {
702c7ea0aa6SQing Li #ifdef RADIX_MPATH
703c7ea0aa6SQing Li 			if (ia->ia_addr.sin_addr.s_addr ==
70442db1b87SBjoern A. Zeeb 			    target->ia_addr.sin_addr.s_addr) {
705cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
706c7ea0aa6SQing Li 				return (EEXIST);
70742db1b87SBjoern A. Zeeb 			} else
708c7ea0aa6SQing Li 				break;
709c7ea0aa6SQing Li #endif
71008b68b0eSGleb Smirnoff 			if (V_nosameprefix) {
711cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7121ae95409SGleb Smirnoff 				return (EEXIST);
7132d9cfabaSRobert Watson 			} else {
7140cfee0c2SAlan Somers 				int fibnum;
7150cfee0c2SAlan Somers 
716cc45ae40SHiroki Sato 				fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
7170cfee0c2SAlan Somers 					target->ia_ifp->if_fib;
718d375edc9SAlexander V. Chernikov 				rt_addrmsg(RTM_ADD, &target->ia_ifa, fibnum);
719cc0a3c8cSAndrey V. Elsukov 				IN_IFADDR_RUNLOCK(&in_ifa_tracker);
7201ae95409SGleb Smirnoff 				return (0);
7211ae95409SGleb Smirnoff 			}
72248321abeSMax Laier 		}
7232d9cfabaSRobert Watson 	}
724cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
72548321abeSMax Laier 
72648321abeSMax Laier 	/*
72748321abeSMax Laier 	 * No-one seem to have this prefix route, so we try to insert it.
72848321abeSMax Laier 	 */
72948321abeSMax Laier 	error = rtinit(&target->ia_ifa, (int)RTM_ADD, flags);
73048321abeSMax Laier 	if (!error)
73148321abeSMax Laier 		target->ia_flags |= IFA_ROUTE;
732460473a0SBjoern A. Zeeb 	return (error);
73348321abeSMax Laier }
73448321abeSMax Laier 
73548321abeSMax Laier /*
7363e7a2321SAlexander V. Chernikov  * Removes either all lle entries for given @ia, or lle
7373e7a2321SAlexander V. Chernikov  * corresponding to @ia address.
7383e7a2321SAlexander V. Chernikov  */
7393e7a2321SAlexander V. Chernikov static void
7403e7a2321SAlexander V. Chernikov in_scrubprefixlle(struct in_ifaddr *ia, int all, u_int flags)
7413e7a2321SAlexander V. Chernikov {
7423e7a2321SAlexander V. Chernikov 	struct sockaddr_in addr, mask;
7433e7a2321SAlexander V. Chernikov 	struct sockaddr *saddr, *smask;
7443e7a2321SAlexander V. Chernikov 	struct ifnet *ifp;
7453e7a2321SAlexander V. Chernikov 
7463e7a2321SAlexander V. Chernikov 	saddr = (struct sockaddr *)&addr;
7473e7a2321SAlexander V. Chernikov 	bzero(&addr, sizeof(addr));
7483e7a2321SAlexander V. Chernikov 	addr.sin_len = sizeof(addr);
7493e7a2321SAlexander V. Chernikov 	addr.sin_family = AF_INET;
7503e7a2321SAlexander V. Chernikov 	smask = (struct sockaddr *)&mask;
7513e7a2321SAlexander V. Chernikov 	bzero(&mask, sizeof(mask));
7523e7a2321SAlexander V. Chernikov 	mask.sin_len = sizeof(mask);
7533e7a2321SAlexander V. Chernikov 	mask.sin_family = AF_INET;
7543e7a2321SAlexander V. Chernikov 	mask.sin_addr.s_addr = ia->ia_subnetmask;
7553e7a2321SAlexander V. Chernikov 	ifp = ia->ia_ifp;
7563e7a2321SAlexander V. Chernikov 
75726a60575SAlexander V. Chernikov 	if (all) {
75826a60575SAlexander V. Chernikov 
75926a60575SAlexander V. Chernikov 		/*
76026a60575SAlexander V. Chernikov 		 * Remove all L2 entries matching given prefix.
76126a60575SAlexander V. Chernikov 		 * Convert address to host representation to avoid
76226a60575SAlexander V. Chernikov 		 * doing this on every callback. ia_subnetmask is already
76326a60575SAlexander V. Chernikov 		 * stored in host representation.
76426a60575SAlexander V. Chernikov 		 */
76526a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ntohl(ia->ia_addr.sin_addr.s_addr);
7663e7a2321SAlexander V. Chernikov 		lltable_prefix_free(AF_INET, saddr, smask, flags);
76726a60575SAlexander V. Chernikov 	} else {
76826a60575SAlexander V. Chernikov 		/* Remove interface address only */
76926a60575SAlexander V. Chernikov 		addr.sin_addr.s_addr = ia->ia_addr.sin_addr.s_addr;
7703e7a2321SAlexander V. Chernikov 		lltable_delete_addr(LLTABLE(ifp), LLE_IFADDR, saddr);
7713e7a2321SAlexander V. Chernikov 	}
77226a60575SAlexander V. Chernikov }
7733e7a2321SAlexander V. Chernikov 
7743e7a2321SAlexander V. Chernikov /*
77548321abeSMax Laier  * If there is no other address in the system that can serve a route to the
77648321abeSMax Laier  * same prefix, remove the route.  Hand over the route to the new address
77748321abeSMax Laier  * otherwise.
77848321abeSMax Laier  */
77908b68b0eSGleb Smirnoff int
7805b84dc78SQing Li in_scrubprefix(struct in_ifaddr *target, u_int flags)
78148321abeSMax Laier {
782cc0a3c8cSAndrey V. Elsukov 	struct rm_priotracker in_ifa_tracker;
78348321abeSMax Laier 	struct in_ifaddr *ia;
78455174c34SGleb Smirnoff 	struct in_addr prefix, mask, p, m;
7857278b62aSAlan Somers 	int error = 0;
78648321abeSMax Laier 
787df813b7eSQing Li 	/*
788df813b7eSQing Li 	 * Remove the loopback route to the interface address.
789df813b7eSQing Li 	 */
79092fac994SQing Li 	if ((target->ia_addr.sin_addr.s_addr != INADDR_ANY) &&
791c7ab6602SQing Li 	    !(target->ia_ifp->if_flags & IFF_LOOPBACK) &&
792f7a39160SGleb Smirnoff 	    (flags & LLE_STATIC)) {
793f7a39160SGleb Smirnoff 		struct in_ifaddr *eia;
794c7ab6602SQing Li 
79559c180c3SAlexander V. Chernikov 		/*
79659c180c3SAlexander V. Chernikov 		 * XXXME: add fib-aware in_localip.
79759c180c3SAlexander V. Chernikov 		 * We definitely don't want to switch between
79859c180c3SAlexander V. Chernikov 		 * prefixes in different fibs.
79959c180c3SAlexander V. Chernikov 		 */
800f7a39160SGleb Smirnoff 		eia = in_localip_more(target);
801f7a39160SGleb Smirnoff 
802f7a39160SGleb Smirnoff 		if (eia != NULL) {
803f7a39160SGleb Smirnoff 			error = ifa_switch_loopback_route((struct ifaddr *)eia,
80459c180c3SAlexander V. Chernikov 			    (struct sockaddr *)&target->ia_addr);
805f7a39160SGleb Smirnoff 			ifa_free(&eia->ia_ifa);
806f7a39160SGleb Smirnoff 		} else {
8079bb7d0f4SQing Li 			error = ifa_del_loopback_route((struct ifaddr *)target,
8089bb7d0f4SQing Li 			    (struct sockaddr *)&target->ia_addr);
8095b84dc78SQing Li 		}
810ebc90701SQing Li 	}
811ebc90701SQing Li 
81255174c34SGleb Smirnoff 	if (rtinitflags(target)) {
81348321abeSMax Laier 		prefix = target->ia_dstaddr.sin_addr;
81455174c34SGleb Smirnoff 		mask.s_addr = 0;
81555174c34SGleb Smirnoff 	} else {
81648321abeSMax Laier 		prefix = target->ia_addr.sin_addr;
81748321abeSMax Laier 		mask = target->ia_sockmask.sin_addr;
81848321abeSMax Laier 		prefix.s_addr &= mask.s_addr;
81948321abeSMax Laier 	}
82048321abeSMax Laier 
821ccbb9c35SQing Li 	if ((target->ia_flags & IFA_ROUTE) == 0) {
8227278b62aSAlan Somers 		int fibnum;
8237278b62aSAlan Somers 
824cc45ae40SHiroki Sato 		fibnum = V_rt_add_addr_allfibs ? RT_ALL_FIBS :
8257278b62aSAlan Somers 			target->ia_ifp->if_fib;
826d375edc9SAlexander V. Chernikov 		rt_addrmsg(RTM_DELETE, &target->ia_ifa, fibnum);
82726a60575SAlexander V. Chernikov 
82826a60575SAlexander V. Chernikov 		/*
82926a60575SAlexander V. Chernikov 		 * Removing address from !IFF_UP interface or
83026a60575SAlexander V. Chernikov 		 * prefix which exists on other interface (along with route).
83126a60575SAlexander V. Chernikov 		 * No entries should exist here except target addr.
83226a60575SAlexander V. Chernikov 		 * Given that, delete this entry only.
83326a60575SAlexander V. Chernikov 		 */
83426a60575SAlexander V. Chernikov 		in_scrubprefixlle(target, 0, flags);
835ccbb9c35SQing Li 		return (0);
836ccbb9c35SQing Li 	}
837ccbb9c35SQing Li 
838cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RLOCK(&in_ifa_tracker);
839603724d3SBjoern A. Zeeb 	TAILQ_FOREACH(ia, &V_in_ifaddrhead, ia_link) {
84055174c34SGleb Smirnoff 		if (rtinitflags(ia)) {
84148321abeSMax Laier 			p = ia->ia_dstaddr.sin_addr;
84255174c34SGleb Smirnoff 
84355174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr)
84455174c34SGleb Smirnoff 				continue;
84555174c34SGleb Smirnoff 		} else {
84648321abeSMax Laier 			p = ia->ia_addr.sin_addr;
84755174c34SGleb Smirnoff 			m = ia->ia_sockmask.sin_addr;
84855174c34SGleb Smirnoff 			p.s_addr &= m.s_addr;
84955174c34SGleb Smirnoff 
85055174c34SGleb Smirnoff 			if (prefix.s_addr != p.s_addr ||
85155174c34SGleb Smirnoff 			    mask.s_addr != m.s_addr)
85255174c34SGleb Smirnoff 				continue;
85348321abeSMax Laier 		}
85448321abeSMax Laier 
85555174c34SGleb Smirnoff 		if ((ia->ia_ifp->if_flags & IFF_UP) == 0)
85648321abeSMax Laier 			continue;
85748321abeSMax Laier 
85848321abeSMax Laier 		/*
85948321abeSMax Laier 		 * If we got a matching prefix address, move IFA_ROUTE and
86048321abeSMax Laier 		 * the route itself to it.  Make sure that routing daemons
86148321abeSMax Laier 		 * get a heads-up.
86248321abeSMax Laier 		 */
86308b68b0eSGleb Smirnoff 		if ((ia->ia_flags & IFA_ROUTE) == 0) {
86479d51435SSergey Kandaurov 			ifa_ref(&ia->ia_ifa);
865cc0a3c8cSAndrey V. Elsukov 			IN_IFADDR_RUNLOCK(&in_ifa_tracker);
86692322284SQing Li 			error = rtinit(&(target->ia_ifa), (int)RTM_DELETE,
86748321abeSMax Laier 			    rtinitflags(target));
86892322284SQing Li 			if (error == 0)
86948321abeSMax Laier 				target->ia_flags &= ~IFA_ROUTE;
87092322284SQing Li 			else
87192322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, old prefix delete failed\n",
87292322284SQing Li 					error);
8733e7a2321SAlexander V. Chernikov 			/* Scrub all entries IFF interface is different */
8743e7a2321SAlexander V. Chernikov 			in_scrubprefixlle(target, target->ia_ifp != ia->ia_ifp,
8753e7a2321SAlexander V. Chernikov 			    flags);
87648321abeSMax Laier 			error = rtinit(&ia->ia_ifa, (int)RTM_ADD,
87748321abeSMax Laier 			    rtinitflags(ia) | RTF_UP);
87848321abeSMax Laier 			if (error == 0)
87948321abeSMax Laier 				ia->ia_flags |= IFA_ROUTE;
88092322284SQing Li 			else
88192322284SQing Li 				log(LOG_INFO, "in_scrubprefix: err=%d, new prefix add failed\n",
88292322284SQing Li 					error);
88379d51435SSergey Kandaurov 			ifa_free(&ia->ia_ifa);
884460473a0SBjoern A. Zeeb 			return (error);
88548321abeSMax Laier 		}
88648321abeSMax Laier 	}
887cc0a3c8cSAndrey V. Elsukov 	IN_IFADDR_RUNLOCK(&in_ifa_tracker);
88848321abeSMax Laier 
88948321abeSMax Laier 	/*
890c9d763bfSQing Li 	 * remove all L2 entries on the given prefix
891c9d763bfSQing Li 	 */
8923e7a2321SAlexander V. Chernikov 	in_scrubprefixlle(target, 1, flags);
893c9d763bfSQing Li 
894c9d763bfSQing Li 	/*
89548321abeSMax Laier 	 * As no-one seem to have this prefix, we can remove the route.
89648321abeSMax Laier 	 */
89792322284SQing Li 	error = rtinit(&(target->ia_ifa), (int)RTM_DELETE, rtinitflags(target));
89892322284SQing Li 	if (error == 0)
89948321abeSMax Laier 		target->ia_flags &= ~IFA_ROUTE;
90092322284SQing Li 	else
90192322284SQing Li 		log(LOG_INFO, "in_scrubprefix: err=%d, prefix delete failed\n", error);
90292322284SQing Li 	return (error);
90348321abeSMax Laier }
90448321abeSMax Laier 
90548321abeSMax Laier #undef rtinitflags
906df8bae1dSRodney W. Grimes 
90789856f7eSBjoern A. Zeeb void
90889856f7eSBjoern A. Zeeb in_ifscrub_all(void)
90989856f7eSBjoern A. Zeeb {
91089856f7eSBjoern A. Zeeb 	struct ifnet *ifp;
91189856f7eSBjoern A. Zeeb 	struct ifaddr *ifa, *nifa;
91289856f7eSBjoern A. Zeeb 	struct ifaliasreq ifr;
91389856f7eSBjoern A. Zeeb 
91489856f7eSBjoern A. Zeeb 	IFNET_RLOCK();
91589856f7eSBjoern A. Zeeb 	TAILQ_FOREACH(ifp, &V_ifnet, if_link) {
91689856f7eSBjoern A. Zeeb 		/* Cannot lock here - lock recursion. */
91789856f7eSBjoern A. Zeeb 		/* IF_ADDR_RLOCK(ifp); */
91889856f7eSBjoern A. Zeeb 		TAILQ_FOREACH_SAFE(ifa, &ifp->if_addrhead, ifa_link, nifa) {
91989856f7eSBjoern A. Zeeb 			if (ifa->ifa_addr->sa_family != AF_INET)
92089856f7eSBjoern A. Zeeb 				continue;
92189856f7eSBjoern A. Zeeb 
92289856f7eSBjoern A. Zeeb 			/*
92389856f7eSBjoern A. Zeeb 			 * This is ugly but the only way for legacy IP to
92489856f7eSBjoern A. Zeeb 			 * cleanly remove addresses and everything attached.
92589856f7eSBjoern A. Zeeb 			 */
92689856f7eSBjoern A. Zeeb 			bzero(&ifr, sizeof(ifr));
92789856f7eSBjoern A. Zeeb 			ifr.ifra_addr = *ifa->ifa_addr;
92889856f7eSBjoern A. Zeeb 			if (ifa->ifa_dstaddr)
92989856f7eSBjoern A. Zeeb 			ifr.ifra_broadaddr = *ifa->ifa_dstaddr;
93089856f7eSBjoern A. Zeeb 			(void)in_control(NULL, SIOCDIFADDR, (caddr_t)&ifr,
93189856f7eSBjoern A. Zeeb 			    ifp, NULL);
93289856f7eSBjoern A. Zeeb 		}
93389856f7eSBjoern A. Zeeb 		/* IF_ADDR_RUNLOCK(ifp); */
93489856f7eSBjoern A. Zeeb 		in_purgemaddrs(ifp);
93589856f7eSBjoern A. Zeeb 		igmp_domifdetach(ifp);
93689856f7eSBjoern A. Zeeb 	}
93789856f7eSBjoern A. Zeeb 	IFNET_RUNLOCK();
93889856f7eSBjoern A. Zeeb }
93989856f7eSBjoern A. Zeeb 
94090cc51a1SRyan Stone int
94190cc51a1SRyan Stone in_ifaddr_broadcast(struct in_addr in, struct in_ifaddr *ia)
94290cc51a1SRyan Stone {
94390cc51a1SRyan Stone 
94490cc51a1SRyan Stone 	return ((in.s_addr == ia->ia_broadaddr.sin_addr.s_addr ||
94590cc51a1SRyan Stone 	     /*
94690cc51a1SRyan Stone 	      * Check for old-style (host 0) broadcast, but
94790cc51a1SRyan Stone 	      * taking into account that RFC 3021 obsoletes it.
94890cc51a1SRyan Stone 	      */
94990cc51a1SRyan Stone 	    (ia->ia_subnetmask != IN_RFC3021_MASK &&
95090cc51a1SRyan Stone 	    ntohl(in.s_addr) == ia->ia_subnet)) &&
95190cc51a1SRyan Stone 	     /*
95290cc51a1SRyan Stone 	      * Check for an all one subnetmask. These
95390cc51a1SRyan Stone 	      * only exist when an interface gets a secondary
95490cc51a1SRyan Stone 	      * address.
95590cc51a1SRyan Stone 	      */
95690cc51a1SRyan Stone 	    ia->ia_subnetmask != (u_long)0xffffffff);
95790cc51a1SRyan Stone }
95890cc51a1SRyan Stone 
959df8bae1dSRodney W. Grimes /*
960df8bae1dSRodney W. Grimes  * Return 1 if the address might be a local broadcast address.
961df8bae1dSRodney W. Grimes  */
96226f9a767SRodney W. Grimes int
963f2565d68SRobert Watson in_broadcast(struct in_addr in, struct ifnet *ifp)
964df8bae1dSRodney W. Grimes {
965df8bae1dSRodney W. Grimes 	register struct ifaddr *ifa;
96611f2a7cdSRyan Stone 	int found;
967df8bae1dSRodney W. Grimes 
968df8bae1dSRodney W. Grimes 	if (in.s_addr == INADDR_BROADCAST ||
969df8bae1dSRodney W. Grimes 	    in.s_addr == INADDR_ANY)
970460473a0SBjoern A. Zeeb 		return (1);
971df8bae1dSRodney W. Grimes 	if ((ifp->if_flags & IFF_BROADCAST) == 0)
972460473a0SBjoern A. Zeeb 		return (0);
97311f2a7cdSRyan Stone 	found = 0;
974df8bae1dSRodney W. Grimes 	/*
975df8bae1dSRodney W. Grimes 	 * Look through the list of addresses for a match
976df8bae1dSRodney W. Grimes 	 * with a broadcast address.
977df8bae1dSRodney W. Grimes 	 */
97811f2a7cdSRyan Stone 	IF_ADDR_RLOCK(ifp);
979462b86feSPoul-Henning Kamp 	TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link)
980df8bae1dSRodney W. Grimes 		if (ifa->ifa_addr->sa_family == AF_INET &&
98111f2a7cdSRyan Stone 		    in_ifaddr_broadcast(in, (struct in_ifaddr *)ifa)) {
98211f2a7cdSRyan Stone 			found = 1;
98311f2a7cdSRyan Stone 			break;
98411f2a7cdSRyan Stone 		}
98511f2a7cdSRyan Stone 	IF_ADDR_RUNLOCK(ifp);
98611f2a7cdSRyan Stone 	return (found);
987df8bae1dSRodney W. Grimes }
988ec002feeSBruce M Simpson 
989df8bae1dSRodney W. Grimes /*
990b1c53bc9SRobert Watson  * On interface removal, clean up IPv4 data structures hung off of the ifnet.
991b1c53bc9SRobert Watson  */
992b1c53bc9SRobert Watson void
993f2565d68SRobert Watson in_ifdetach(struct ifnet *ifp)
994b1c53bc9SRobert Watson {
995b1c53bc9SRobert Watson 
996603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_ripcbinfo, ifp);
997603724d3SBjoern A. Zeeb 	in_pcbpurgeif0(&V_udbinfo, ifp);
998e06e816fSKevin Lo 	in_pcbpurgeif0(&V_ulitecbinfo, ifp);
999ec002feeSBruce M Simpson 	in_purgemaddrs(ifp);
1000b1c53bc9SRobert Watson }
10016e6b3f7cSQing Li 
1002d10910e6SBruce M Simpson /*
1003d10910e6SBruce M Simpson  * Delete all IPv4 multicast address records, and associated link-layer
1004d10910e6SBruce M Simpson  * multicast address records, associated with ifp.
1005d10910e6SBruce M Simpson  * XXX It looks like domifdetach runs AFTER the link layer cleanup.
100656663a40SBruce M Simpson  * XXX This should not race with ifma_protospec being set during
100756663a40SBruce M Simpson  * a new allocation, if it does, we have bigger problems.
1008d10910e6SBruce M Simpson  */
1009d10910e6SBruce M Simpson static void
1010d10910e6SBruce M Simpson in_purgemaddrs(struct ifnet *ifp)
1011d10910e6SBruce M Simpson {
1012d10910e6SBruce M Simpson 	LIST_HEAD(,in_multi) purgeinms;
1013d10910e6SBruce M Simpson 	struct in_multi		*inm, *tinm;
1014d10910e6SBruce M Simpson 	struct ifmultiaddr	*ifma;
1015d10910e6SBruce M Simpson 
1016d10910e6SBruce M Simpson 	LIST_INIT(&purgeinms);
1017d10910e6SBruce M Simpson 	IN_MULTI_LOCK();
1018d10910e6SBruce M Simpson 
1019d10910e6SBruce M Simpson 	/*
1020d10910e6SBruce M Simpson 	 * Extract list of in_multi associated with the detaching ifp
1021d10910e6SBruce M Simpson 	 * which the PF_INET layer is about to release.
1022d10910e6SBruce M Simpson 	 * We need to do this as IF_ADDR_LOCK() may be re-acquired
1023d10910e6SBruce M Simpson 	 * by code further down.
1024d10910e6SBruce M Simpson 	 */
1025137f91e8SJohn Baldwin 	IF_ADDR_RLOCK(ifp);
1026d10910e6SBruce M Simpson 	TAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
102756663a40SBruce M Simpson 		if (ifma->ifma_addr->sa_family != AF_INET ||
102856663a40SBruce M Simpson 		    ifma->ifma_protospec == NULL)
1029d10910e6SBruce M Simpson 			continue;
103056663a40SBruce M Simpson #if 0
103156663a40SBruce M Simpson 		KASSERT(ifma->ifma_protospec != NULL,
103256663a40SBruce M Simpson 		    ("%s: ifma_protospec is NULL", __func__));
103356663a40SBruce M Simpson #endif
1034d10910e6SBruce M Simpson 		inm = (struct in_multi *)ifma->ifma_protospec;
1035d10910e6SBruce M Simpson 		LIST_INSERT_HEAD(&purgeinms, inm, inm_link);
1036d10910e6SBruce M Simpson 	}
1037137f91e8SJohn Baldwin 	IF_ADDR_RUNLOCK(ifp);
1038d10910e6SBruce M Simpson 
1039d10910e6SBruce M Simpson 	LIST_FOREACH_SAFE(inm, &purgeinms, inm_link, tinm) {
1040d10910e6SBruce M Simpson 		LIST_REMOVE(inm, inm_link);
104107cde5e9SRobert Watson 		inm_release_locked(inm);
1042d10910e6SBruce M Simpson 	}
1043d10910e6SBruce M Simpson 	igmp_ifdetach(ifp);
1044d10910e6SBruce M Simpson 
1045d10910e6SBruce M Simpson 	IN_MULTI_UNLOCK();
1046d10910e6SBruce M Simpson }
1047d10910e6SBruce M Simpson 
10486e6b3f7cSQing Li struct in_llentry {
10496e6b3f7cSQing Li 	struct llentry		base;
10506e6b3f7cSQing Li };
10516e6b3f7cSQing Li 
105211cdad98SAlexander V. Chernikov #define	IN_LLTBL_DEFAULT_HSIZE	32
105311cdad98SAlexander V. Chernikov #define	IN_LLTBL_HASH(k, h) \
105411cdad98SAlexander V. Chernikov 	(((((((k >> 8) ^ k) >> 8) ^ k) >> 8) ^ k) & ((h) - 1))
105511cdad98SAlexander V. Chernikov 
1056a93cda78SKip Macy /*
105711cdad98SAlexander V. Chernikov  * Do actual deallocation of @lle.
10582769d062SConrad Meyer  */
10592769d062SConrad Meyer static void
10602769d062SConrad Meyer in_lltable_destroy_lle_unlocked(struct llentry *lle)
10612769d062SConrad Meyer {
10622769d062SConrad Meyer 
10632769d062SConrad Meyer 	LLE_LOCK_DESTROY(lle);
10642769d062SConrad Meyer 	LLE_REQ_DESTROY(lle);
10652769d062SConrad Meyer 	free(lle, M_LLTABLE);
10662769d062SConrad Meyer }
10672769d062SConrad Meyer 
10682769d062SConrad Meyer /*
106911cdad98SAlexander V. Chernikov  * Called by LLE_FREE_LOCKED when number of references
107011cdad98SAlexander V. Chernikov  * drops to zero.
1071a93cda78SKip Macy  */
1072a93cda78SKip Macy static void
107311cdad98SAlexander V. Chernikov in_lltable_destroy_lle(struct llentry *lle)
1074a93cda78SKip Macy {
107511cdad98SAlexander V. Chernikov 
1076a93cda78SKip Macy 	LLE_WUNLOCK(lle);
10772769d062SConrad Meyer 	in_lltable_destroy_lle_unlocked(lle);
1078a93cda78SKip Macy }
1079a93cda78SKip Macy 
10806e6b3f7cSQing Li static struct llentry *
1081314294deSAlexander V. Chernikov in_lltable_new(struct in_addr addr4, u_int flags)
10826e6b3f7cSQing Li {
10836e6b3f7cSQing Li 	struct in_llentry *lle;
10846e6b3f7cSQing Li 
108590b357f6SGleb Smirnoff 	lle = malloc(sizeof(struct in_llentry), M_LLTABLE, M_NOWAIT | M_ZERO);
10866e6b3f7cSQing Li 	if (lle == NULL)		/* NB: caller generates msg */
10876e6b3f7cSQing Li 		return NULL;
10886e6b3f7cSQing Li 
10896e6b3f7cSQing Li 	/*
10906e6b3f7cSQing Li 	 * For IPv4 this will trigger "arpresolve" to generate
10916e6b3f7cSQing Li 	 * an ARP request.
10926e6b3f7cSQing Li 	 */
1093a98c06f1SGleb Smirnoff 	lle->base.la_expire = time_uptime; /* mark expired */
1094314294deSAlexander V. Chernikov 	lle->base.r_l3addr.addr4 = addr4;
10956e6b3f7cSQing Li 	lle->base.lle_refcnt = 1;
109611cdad98SAlexander V. Chernikov 	lle->base.lle_free = in_lltable_destroy_lle;
10976e6b3f7cSQing Li 	LLE_LOCK_INIT(&lle->base);
1098f8aee88fSAlexander V. Chernikov 	LLE_REQ_INIT(&lle->base);
10990447c136SAlexander V. Chernikov 	callout_init(&lle->base.lle_timer, 1);
1100ea537929SGleb Smirnoff 
1101ea537929SGleb Smirnoff 	return (&lle->base);
11026e6b3f7cSQing Li }
11036e6b3f7cSQing Li 
1104c9d763bfSQing Li #define IN_ARE_MASKED_ADDR_EQUAL(d, a, m)	(		\
11053e7a2321SAlexander V. Chernikov 	((((d).s_addr ^ (a).s_addr) & (m).s_addr)) == 0 )
1106c9d763bfSQing Li 
110711cdad98SAlexander V. Chernikov static int
11083e7a2321SAlexander V. Chernikov in_lltable_match_prefix(const struct sockaddr *saddr,
11093e7a2321SAlexander V. Chernikov     const struct sockaddr *smask, u_int flags, struct llentry *lle)
1110c9d763bfSQing Li {
11113e7a2321SAlexander V. Chernikov 	struct in_addr addr, mask, lle_addr;
11123e7a2321SAlexander V. Chernikov 
11133e7a2321SAlexander V. Chernikov 	addr = ((const struct sockaddr_in *)saddr)->sin_addr;
11143e7a2321SAlexander V. Chernikov 	mask = ((const struct sockaddr_in *)smask)->sin_addr;
11153e7a2321SAlexander V. Chernikov 	lle_addr.s_addr = ntohl(lle->r_l3addr.addr4.s_addr);
11163e7a2321SAlexander V. Chernikov 
11173e7a2321SAlexander V. Chernikov 	if (IN_ARE_MASKED_ADDR_EQUAL(lle_addr, addr, mask) == 0)
11183e7a2321SAlexander V. Chernikov 		return (0);
11193e7a2321SAlexander V. Chernikov 
11203e7a2321SAlexander V. Chernikov 	if (lle->la_flags & LLE_IFADDR) {
1121c9d763bfSQing Li 
11225b84dc78SQing Li 		/*
11233e7a2321SAlexander V. Chernikov 		 * Delete LLE_IFADDR records IFF address & flag matches.
11243e7a2321SAlexander V. Chernikov 		 * Note that addr is the interface address within prefix
11253e7a2321SAlexander V. Chernikov 		 * being matched.
11263e7a2321SAlexander V. Chernikov 		 * Note also we should handle 'ifdown' cases without removing
11273e7a2321SAlexander V. Chernikov 		 * ifaddr macs.
11285b84dc78SQing Li 		 */
11293e7a2321SAlexander V. Chernikov 		if (addr.s_addr == lle_addr.s_addr && (flags & LLE_STATIC) != 0)
11303e7a2321SAlexander V. Chernikov 			return (1);
11313e7a2321SAlexander V. Chernikov 		return (0);
11323e7a2321SAlexander V. Chernikov 	}
11333e7a2321SAlexander V. Chernikov 
11343e7a2321SAlexander V. Chernikov 	/* flags & LLE_STATIC means deleting both dynamic and static entries */
11353e7a2321SAlexander V. Chernikov 	if ((flags & LLE_STATIC) || !(lle->la_flags & LLE_STATIC))
113611cdad98SAlexander V. Chernikov 		return (1);
113711cdad98SAlexander V. Chernikov 
113811cdad98SAlexander V. Chernikov 	return (0);
113911cdad98SAlexander V. Chernikov }
114011cdad98SAlexander V. Chernikov 
114111cdad98SAlexander V. Chernikov static void
114211cdad98SAlexander V. Chernikov in_lltable_free_entry(struct lltable *llt, struct llentry *lle)
114311cdad98SAlexander V. Chernikov {
114411cdad98SAlexander V. Chernikov 	struct ifnet *ifp;
114511cdad98SAlexander V. Chernikov 	size_t pkts_dropped;
114611cdad98SAlexander V. Chernikov 
114711cdad98SAlexander V. Chernikov 	LLE_WLOCK_ASSERT(lle);
114811cdad98SAlexander V. Chernikov 	KASSERT(llt != NULL, ("lltable is NULL"));
114911cdad98SAlexander V. Chernikov 
115011cdad98SAlexander V. Chernikov 	/* Unlink entry from table if not already */
115111cdad98SAlexander V. Chernikov 	if ((lle->la_flags & LLE_LINKED) != 0) {
115211cdad98SAlexander V. Chernikov 		ifp = llt->llt_ifp;
115311cdad98SAlexander V. Chernikov 		IF_AFDATA_WLOCK_ASSERT(ifp);
115411cdad98SAlexander V. Chernikov 		lltable_unlink_entry(llt, lle);
115511cdad98SAlexander V. Chernikov 	}
115611cdad98SAlexander V. Chernikov 
115711cdad98SAlexander V. Chernikov 	/* cancel timer */
11587c4676ddSRandall Stewart 	if (callout_stop(&lle->lle_timer) > 0)
1159becba438SBjoern A. Zeeb 		LLE_REMREF(lle);
116011cdad98SAlexander V. Chernikov 
116111cdad98SAlexander V. Chernikov 	/* Drop hold queue */
1162e162ea60SGeorge V. Neville-Neil 	pkts_dropped = llentry_free(lle);
1163e162ea60SGeorge V. Neville-Neil 	ARPSTAT_ADD(dropped, pkts_dropped);
1164c9d763bfSQing Li }
1165c9d763bfSQing Li 
11666e6b3f7cSQing Li static int
1167c7ab6602SQing Li in_lltable_rtcheck(struct ifnet *ifp, u_int flags, const struct sockaddr *l3addr)
11686e6b3f7cSQing Li {
11699a1b64d5SAlexander V. Chernikov 	struct rt_addrinfo info;
11709a1b64d5SAlexander V. Chernikov 	struct sockaddr_in rt_key, rt_mask;
11719a1b64d5SAlexander V. Chernikov 	struct sockaddr rt_gateway;
11729a1b64d5SAlexander V. Chernikov 	int rt_flags;
11736e6b3f7cSQing Li 
11746e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
11756e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
11766e6b3f7cSQing Li 
11779a1b64d5SAlexander V. Chernikov 	bzero(&rt_key, sizeof(rt_key));
11789a1b64d5SAlexander V. Chernikov 	rt_key.sin_len = sizeof(rt_key);
11799a1b64d5SAlexander V. Chernikov 	bzero(&rt_mask, sizeof(rt_mask));
11809a1b64d5SAlexander V. Chernikov 	rt_mask.sin_len = sizeof(rt_mask);
11819a1b64d5SAlexander V. Chernikov 	bzero(&rt_gateway, sizeof(rt_gateway));
11829a1b64d5SAlexander V. Chernikov 	rt_gateway.sa_len = sizeof(rt_gateway);
118313e255faSMarko Zec 
11849a1b64d5SAlexander V. Chernikov 	bzero(&info, sizeof(info));
11859a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_DST] = (struct sockaddr *)&rt_key;
11869a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_NETMASK] = (struct sockaddr *)&rt_mask;
11879a1b64d5SAlexander V. Chernikov 	info.rti_info[RTAX_GATEWAY] = (struct sockaddr *)&rt_gateway;
11889a1b64d5SAlexander V. Chernikov 
11899a1b64d5SAlexander V. Chernikov 	if (rib_lookup_info(ifp->if_fib, l3addr, NHR_REF, 0, &info) != 0)
11906cf8e330SQing Li 		return (EINVAL);
11916cf8e330SQing Li 
11929a1b64d5SAlexander V. Chernikov 	rt_flags = info.rti_flags;
11939a1b64d5SAlexander V. Chernikov 
119413e255faSMarko Zec 	/*
119513e255faSMarko Zec 	 * If the gateway for an existing host route matches the target L3
11966cf8e330SQing Li 	 * address, which is a special route inserted by some implementation
11976cf8e330SQing Li 	 * such as MANET, and the interface is of the correct type, then
11986cf8e330SQing Li 	 * allow for ARP to proceed.
119913e255faSMarko Zec 	 */
12009a1b64d5SAlexander V. Chernikov 	if (rt_flags & RTF_GATEWAY) {
12019a1b64d5SAlexander V. Chernikov 		if (!(rt_flags & RTF_HOST) || !info.rti_ifp ||
12029a1b64d5SAlexander V. Chernikov 		    info.rti_ifp->if_type != IFT_ETHER ||
12039a1b64d5SAlexander V. Chernikov 		    (info.rti_ifp->if_flags & (IFF_NOARP | IFF_STATICARP)) != 0 ||
12049a1b64d5SAlexander V. Chernikov 		    memcmp(rt_gateway.sa_data, l3addr->sa_data,
120515d25219SQing Li 		    sizeof(in_addr_t)) != 0) {
12069a1b64d5SAlexander V. Chernikov 			rib_free_info(&info);
1207db92413eSQing Li 			return (EINVAL);
1208db92413eSQing Li 		}
120915d25219SQing Li 	}
12109a1b64d5SAlexander V. Chernikov 	rib_free_info(&info);
1211db92413eSQing Li 
1212db92413eSQing Li 	/*
1213db92413eSQing Li 	 * Make sure that at least the destination address is covered
1214db92413eSQing Li 	 * by the route. This is for handling the case where 2 or more
1215db92413eSQing Li 	 * interfaces have the same prefix. An incoming packet arrives
1216db92413eSQing Li 	 * on one interface and the corresponding outgoing packet leaves
1217db92413eSQing Li 	 * another interface.
1218db92413eSQing Li 	 */
12199a1b64d5SAlexander V. Chernikov 	if (!(rt_flags & RTF_HOST) && info.rti_ifp != ifp) {
122015d25219SQing Li 		const char *sa, *mask, *addr, *lim;
12218144690aSEric van Gyzen 		const struct sockaddr_in *l3sin;
1222db92413eSQing Li 
12239a1b64d5SAlexander V. Chernikov 		mask = (const char *)&rt_mask;
1224b3664a14SQing Li 		/*
1225b3664a14SQing Li 		 * Just being extra cautious to avoid some custom
1226b3664a14SQing Li 		 * code getting into trouble.
1227b3664a14SQing Li 		 */
12289a1b64d5SAlexander V. Chernikov 		if ((info.rti_addrs & RTA_NETMASK) == 0)
1229b3664a14SQing Li 			return (EINVAL);
1230b3664a14SQing Li 
12319a1b64d5SAlexander V. Chernikov 		sa = (const char *)&rt_key;
123215d25219SQing Li 		addr = (const char *)l3addr;
12338144690aSEric van Gyzen 		l3sin = (const struct sockaddr_in *)l3addr;
12348144690aSEric van Gyzen 		lim = addr + l3sin->sin_len;
1235db92413eSQing Li 
1236db92413eSQing Li 		for ( ; addr < lim; sa++, mask++, addr++) {
1237db92413eSQing Li 			if ((*sa ^ *addr) & *mask) {
12386cb2b4e7SQing Li #ifdef DIAGNOSTIC
12398144690aSEric van Gyzen 				char addrbuf[INET_ADDRSTRLEN];
12408144690aSEric van Gyzen 
12418144690aSEric van Gyzen 				log(LOG_INFO, "IPv4 address: \"%s\" "
12428144690aSEric van Gyzen 				    "is not on the network\n",
12438144690aSEric van Gyzen 				    inet_ntoa_r(l3sin->sin_addr, addrbuf));
1244b4a22c36SQing Li #endif
124515d25219SQing Li 				return (EINVAL);
12466e6b3f7cSQing Li 			}
1247db92413eSQing Li 		}
1248db92413eSQing Li 	}
1249db92413eSQing Li 
125015d25219SQing Li 	return (0);
12516e6b3f7cSQing Li }
12526e6b3f7cSQing Li 
125311cdad98SAlexander V. Chernikov static inline uint32_t
125411cdad98SAlexander V. Chernikov in_lltable_hash_dst(const struct in_addr dst, uint32_t hsize)
125511cdad98SAlexander V. Chernikov {
125611cdad98SAlexander V. Chernikov 
125711cdad98SAlexander V. Chernikov 	return (IN_LLTBL_HASH(dst.s_addr, hsize));
125811cdad98SAlexander V. Chernikov }
125911cdad98SAlexander V. Chernikov 
126011cdad98SAlexander V. Chernikov static uint32_t
126111cdad98SAlexander V. Chernikov in_lltable_hash(const struct llentry *lle, uint32_t hsize)
126211cdad98SAlexander V. Chernikov {
126311cdad98SAlexander V. Chernikov 
1264314294deSAlexander V. Chernikov 	return (in_lltable_hash_dst(lle->r_l3addr.addr4, hsize));
126511cdad98SAlexander V. Chernikov }
126611cdad98SAlexander V. Chernikov 
126711cdad98SAlexander V. Chernikov static void
126811cdad98SAlexander V. Chernikov in_lltable_fill_sa_entry(const struct llentry *lle, struct sockaddr *sa)
126911cdad98SAlexander V. Chernikov {
127011cdad98SAlexander V. Chernikov 	struct sockaddr_in *sin;
127111cdad98SAlexander V. Chernikov 
127211cdad98SAlexander V. Chernikov 	sin = (struct sockaddr_in *)sa;
127311cdad98SAlexander V. Chernikov 	bzero(sin, sizeof(*sin));
127411cdad98SAlexander V. Chernikov 	sin->sin_family = AF_INET;
127511cdad98SAlexander V. Chernikov 	sin->sin_len = sizeof(*sin);
1276314294deSAlexander V. Chernikov 	sin->sin_addr = lle->r_l3addr.addr4;
127711cdad98SAlexander V. Chernikov }
127811cdad98SAlexander V. Chernikov 
1279b4b1367aSAlexander V. Chernikov static inline struct llentry *
1280b4b1367aSAlexander V. Chernikov in_lltable_find_dst(struct lltable *llt, struct in_addr dst)
1281b4b1367aSAlexander V. Chernikov {
1282b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
1283b4b1367aSAlexander V. Chernikov 	struct llentries *lleh;
128411cdad98SAlexander V. Chernikov 	u_int hashidx;
1285b4b1367aSAlexander V. Chernikov 
12863a749863SAlexander V. Chernikov 	hashidx = in_lltable_hash_dst(dst, llt->llt_hsize);
128711cdad98SAlexander V. Chernikov 	lleh = &llt->lle_head[hashidx];
1288b4b1367aSAlexander V. Chernikov 	LIST_FOREACH(lle, lleh, lle_next) {
1289b4b1367aSAlexander V. Chernikov 		if (lle->la_flags & LLE_DELETED)
1290b4b1367aSAlexander V. Chernikov 			continue;
1291314294deSAlexander V. Chernikov 		if (lle->r_l3addr.addr4.s_addr == dst.s_addr)
1292b4b1367aSAlexander V. Chernikov 			break;
1293b4b1367aSAlexander V. Chernikov 	}
1294b4b1367aSAlexander V. Chernikov 
1295b4b1367aSAlexander V. Chernikov 	return (lle);
1296b4b1367aSAlexander V. Chernikov }
1297b4b1367aSAlexander V. Chernikov 
12983e7a2321SAlexander V. Chernikov static void
12993e7a2321SAlexander V. Chernikov in_lltable_delete_entry(struct lltable *llt, struct llentry *lle)
1300b4b1367aSAlexander V. Chernikov {
1301b4b1367aSAlexander V. Chernikov 
1302b4b1367aSAlexander V. Chernikov 	lle->la_flags |= LLE_DELETED;
1303b4b1367aSAlexander V. Chernikov 	EVENTHANDLER_INVOKE(lle_event, lle, LLENTRY_DELETED);
1304b4b1367aSAlexander V. Chernikov #ifdef DIAGNOSTIC
1305b4b1367aSAlexander V. Chernikov 	log(LOG_INFO, "ifaddr cache = %p is deleted\n", lle);
1306b4b1367aSAlexander V. Chernikov #endif
1307b4b1367aSAlexander V. Chernikov 	llentry_free(lle);
1308b4b1367aSAlexander V. Chernikov }
1309b4b1367aSAlexander V. Chernikov 
1310b4b1367aSAlexander V. Chernikov static struct llentry *
13115a255516SAlexander V. Chernikov in_lltable_alloc(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
1312b4b1367aSAlexander V. Chernikov {
1313b4b1367aSAlexander V. Chernikov 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
1314b4b1367aSAlexander V. Chernikov 	struct ifnet *ifp = llt->llt_ifp;
1315b4b1367aSAlexander V. Chernikov 	struct llentry *lle;
13164fb3a820SAlexander V. Chernikov 	char linkhdr[LLE_MAX_LINKHDR];
13174fb3a820SAlexander V. Chernikov 	size_t linkhdrsize;
13184fb3a820SAlexander V. Chernikov 	int lladdr_off;
1319b4b1367aSAlexander V. Chernikov 
1320b4b1367aSAlexander V. Chernikov 	KASSERT(l3addr->sa_family == AF_INET,
1321b4b1367aSAlexander V. Chernikov 	    ("sin_family %d", l3addr->sa_family));
1322b4b1367aSAlexander V. Chernikov 
1323b4b1367aSAlexander V. Chernikov 	/*
1324b4b1367aSAlexander V. Chernikov 	 * A route that covers the given address must have
1325b4b1367aSAlexander V. Chernikov 	 * been installed 1st because we are doing a resolution,
1326b4b1367aSAlexander V. Chernikov 	 * verify this.
1327b4b1367aSAlexander V. Chernikov 	 */
1328b4b1367aSAlexander V. Chernikov 	if (!(flags & LLE_IFADDR) &&
1329b4b1367aSAlexander V. Chernikov 	    in_lltable_rtcheck(ifp, flags, l3addr) != 0)
1330b4b1367aSAlexander V. Chernikov 		return (NULL);
1331b4b1367aSAlexander V. Chernikov 
1332314294deSAlexander V. Chernikov 	lle = in_lltable_new(sin->sin_addr, flags);
1333b4b1367aSAlexander V. Chernikov 	if (lle == NULL) {
1334b4b1367aSAlexander V. Chernikov 		log(LOG_INFO, "lla_lookup: new lle malloc failed\n");
1335b4b1367aSAlexander V. Chernikov 		return (NULL);
1336b4b1367aSAlexander V. Chernikov 	}
1337b4b1367aSAlexander V. Chernikov 	lle->la_flags = flags;
1338f8aee88fSAlexander V. Chernikov 	if (flags & LLE_STATIC)
1339f8aee88fSAlexander V. Chernikov 		lle->r_flags |= RLLE_VALID;
1340b4b1367aSAlexander V. Chernikov 	if ((flags & LLE_IFADDR) == LLE_IFADDR) {
13414fb3a820SAlexander V. Chernikov 		linkhdrsize = LLE_MAX_LINKHDR;
13424fb3a820SAlexander V. Chernikov 		if (lltable_calc_llheader(ifp, AF_INET, IF_LLADDR(ifp),
13432769d062SConrad Meyer 		    linkhdr, &linkhdrsize, &lladdr_off) != 0) {
13442769d062SConrad Meyer 			in_lltable_destroy_lle_unlocked(lle);
13454fb3a820SAlexander V. Chernikov 			return (NULL);
13462769d062SConrad Meyer 		}
13474fb3a820SAlexander V. Chernikov 		lltable_set_entry_addr(ifp, lle, linkhdr, linkhdrsize,
13484fb3a820SAlexander V. Chernikov 		    lladdr_off);
1349ddd208f7SAlexander V. Chernikov 		lle->la_flags |= LLE_STATIC;
1350f8aee88fSAlexander V. Chernikov 		lle->r_flags |= (RLLE_VALID | RLLE_IFADDR);
1351b4b1367aSAlexander V. Chernikov 	}
1352b4b1367aSAlexander V. Chernikov 
1353b4b1367aSAlexander V. Chernikov 	return (lle);
1354b4b1367aSAlexander V. Chernikov }
1355b4b1367aSAlexander V. Chernikov 
13566e6b3f7cSQing Li /*
13576e6b3f7cSQing Li  * Return NULL if not found or marked for deletion.
13586e6b3f7cSQing Li  * If found return lle read locked.
13596e6b3f7cSQing Li  */
13606e6b3f7cSQing Li static struct llentry *
13616e6b3f7cSQing Li in_lltable_lookup(struct lltable *llt, u_int flags, const struct sockaddr *l3addr)
13626e6b3f7cSQing Li {
13636e6b3f7cSQing Li 	const struct sockaddr_in *sin = (const struct sockaddr_in *)l3addr;
13646e6b3f7cSQing Li 	struct llentry *lle;
13656e6b3f7cSQing Li 
13666e4cd746SMarius Strobl 	IF_AFDATA_LOCK_ASSERT(llt->llt_ifp);
13676e6b3f7cSQing Li 	KASSERT(l3addr->sa_family == AF_INET,
13686e6b3f7cSQing Li 	    ("sin_family %d", l3addr->sa_family));
136911cdad98SAlexander V. Chernikov 	lle = in_lltable_find_dst(llt, sin->sin_addr);
1370b4b1367aSAlexander V. Chernikov 
1371b4b1367aSAlexander V. Chernikov 	if (lle == NULL)
13726e6b3f7cSQing Li 		return (NULL);
13736e6b3f7cSQing Li 
1374f8aee88fSAlexander V. Chernikov 	KASSERT((flags & (LLE_UNLOCKED|LLE_EXCLUSIVE)) !=
1375f8aee88fSAlexander V. Chernikov 	    (LLE_UNLOCKED|LLE_EXCLUSIVE),("wrong lle request flags: 0x%X",
1376f8aee88fSAlexander V. Chernikov 	    flags));
1377f8aee88fSAlexander V. Chernikov 
1378f8aee88fSAlexander V. Chernikov 	if (flags & LLE_UNLOCKED)
1379f8aee88fSAlexander V. Chernikov 		return (lle);
1380f8aee88fSAlexander V. Chernikov 
13816e6b3f7cSQing Li 	if (flags & LLE_EXCLUSIVE)
13826e6b3f7cSQing Li 		LLE_WLOCK(lle);
13836e6b3f7cSQing Li 	else
13846e6b3f7cSQing Li 		LLE_RLOCK(lle);
1385b4b1367aSAlexander V. Chernikov 
13866e6b3f7cSQing Li 	return (lle);
13876e6b3f7cSQing Li }
13886e6b3f7cSQing Li 
13896e6b3f7cSQing Li static int
139011cdad98SAlexander V. Chernikov in_lltable_dump_entry(struct lltable *llt, struct llentry *lle,
139111cdad98SAlexander V. Chernikov     struct sysctl_req *wr)
13926e6b3f7cSQing Li {
13936e6b3f7cSQing Li 	struct ifnet *ifp = llt->llt_ifp;
13946e6b3f7cSQing Li 	/* XXX stack use */
13956e6b3f7cSQing Li 	struct {
13966e6b3f7cSQing Li 		struct rt_msghdr	rtm;
13979711a168SGleb Smirnoff 		struct sockaddr_in	sin;
13986e6b3f7cSQing Li 		struct sockaddr_dl	sdl;
13996e6b3f7cSQing Li 	} arpc;
14006e6b3f7cSQing Li 	struct sockaddr_dl *sdl;
140111cdad98SAlexander V. Chernikov 	int error;
14026e6b3f7cSQing Li 
140311cdad98SAlexander V. Chernikov 	bzero(&arpc, sizeof(arpc));
14046e6b3f7cSQing Li 			/* skip deleted entries */
140593704ac5SQing Li 			if ((lle->la_flags & LLE_DELETED) == LLE_DELETED)
140611cdad98SAlexander V. Chernikov 				return (0);
1407813dd6aeSBjoern A. Zeeb 			/* Skip if jailed and not a valid IP of the prison. */
140811cdad98SAlexander V. Chernikov 			lltable_fill_sa_entry(lle,(struct sockaddr *)&arpc.sin);
140911cdad98SAlexander V. Chernikov 			if (prison_if(wr->td->td_ucred,
141011cdad98SAlexander V. Chernikov 			    (struct sockaddr *)&arpc.sin) != 0)
141111cdad98SAlexander V. Chernikov 				return (0);
14126e6b3f7cSQing Li 			/*
14136e6b3f7cSQing Li 			 * produce a msg made of:
14146e6b3f7cSQing Li 			 *  struct rt_msghdr;
14159711a168SGleb Smirnoff 			 *  struct sockaddr_in; (IPv4)
14166e6b3f7cSQing Li 			 *  struct sockaddr_dl;
14176e6b3f7cSQing Li 			 */
14186e6b3f7cSQing Li 			arpc.rtm.rtm_msglen = sizeof(arpc);
1419c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_version = RTM_VERSION;
1420c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_type = RTM_GET;
1421c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_flags = RTF_UP;
1422c0e9a8a1SHartmut Brandt 			arpc.rtm.rtm_addrs = RTA_DST | RTA_GATEWAY;
14236e6b3f7cSQing Li 
14246e6b3f7cSQing Li 			/* publish */
14259711a168SGleb Smirnoff 			if (lle->la_flags & LLE_PUB)
14266e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_ANNOUNCE;
14276e6b3f7cSQing Li 
14286e6b3f7cSQing Li 			sdl = &arpc.sdl;
14296e6b3f7cSQing Li 			sdl->sdl_family = AF_LINK;
14306e6b3f7cSQing Li 			sdl->sdl_len = sizeof(*sdl);
14316e6b3f7cSQing Li 			sdl->sdl_index = ifp->if_index;
14326e6b3f7cSQing Li 			sdl->sdl_type = ifp->if_type;
143393704ac5SQing Li 			if ((lle->la_flags & LLE_VALID) == LLE_VALID) {
143493704ac5SQing Li 				sdl->sdl_alen = ifp->if_addrlen;
14354fb3a820SAlexander V. Chernikov 				bcopy(lle->ll_addr, LLADDR(sdl), ifp->if_addrlen);
143693704ac5SQing Li 			} else {
143793704ac5SQing Li 				sdl->sdl_alen = 0;
143893704ac5SQing Li 				bzero(LLADDR(sdl), ifp->if_addrlen);
143993704ac5SQing Li 			}
14406e6b3f7cSQing Li 
14416e6b3f7cSQing Li 			arpc.rtm.rtm_rmx.rmx_expire =
14426e6b3f7cSQing Li 			    lle->la_flags & LLE_STATIC ? 0 : lle->la_expire;
14438eca593cSQing Li 			arpc.rtm.rtm_flags |= (RTF_HOST | RTF_LLDATA);
14446e6b3f7cSQing Li 			if (lle->la_flags & LLE_STATIC)
14456e6b3f7cSQing Li 				arpc.rtm.rtm_flags |= RTF_STATIC;
14464a336ef4SAlexander V. Chernikov 			if (lle->la_flags & LLE_IFADDR)
14474a336ef4SAlexander V. Chernikov 				arpc.rtm.rtm_flags |= RTF_PINNED;
14486e6b3f7cSQing Li 			arpc.rtm.rtm_index = ifp->if_index;
14496e6b3f7cSQing Li 			error = SYSCTL_OUT(wr, &arpc, sizeof(arpc));
145011cdad98SAlexander V. Chernikov 
145111cdad98SAlexander V. Chernikov 	return (error);
14526e6b3f7cSQing Li }
14536e6b3f7cSQing Li 
14543a749863SAlexander V. Chernikov static struct lltable *
14553a749863SAlexander V. Chernikov in_lltattach(struct ifnet *ifp)
14566e6b3f7cSQing Li {
1457d10910e6SBruce M Simpson 	struct lltable *llt;
14586e6b3f7cSQing Li 
14593a749863SAlexander V. Chernikov 	llt = lltable_allocate_htbl(IN_LLTBL_DEFAULT_HSIZE);
1460721cd2e0SAlexander V. Chernikov  	llt->llt_af = AF_INET;
1461721cd2e0SAlexander V. Chernikov  	llt->llt_ifp = ifp;
1462d10910e6SBruce M Simpson 
14636e6b3f7cSQing Li 	llt->llt_lookup = in_lltable_lookup;
14645a255516SAlexander V. Chernikov 	llt->llt_alloc_entry = in_lltable_alloc;
14653e7a2321SAlexander V. Chernikov 	llt->llt_delete_entry = in_lltable_delete_entry;
146611cdad98SAlexander V. Chernikov 	llt->llt_dump_entry = in_lltable_dump_entry;
146711cdad98SAlexander V. Chernikov 	llt->llt_hash = in_lltable_hash;
146811cdad98SAlexander V. Chernikov 	llt->llt_fill_sa_entry = in_lltable_fill_sa_entry;
146911cdad98SAlexander V. Chernikov 	llt->llt_free_entry = in_lltable_free_entry;
147011cdad98SAlexander V. Chernikov 	llt->llt_match_prefix = in_lltable_match_prefix;
1471721cd2e0SAlexander V. Chernikov  	lltable_link(llt);
1472d10910e6SBruce M Simpson 
14733a749863SAlexander V. Chernikov 	return (llt);
14743a749863SAlexander V. Chernikov }
14753a749863SAlexander V. Chernikov 
14763a749863SAlexander V. Chernikov void *
14773a749863SAlexander V. Chernikov in_domifattach(struct ifnet *ifp)
14783a749863SAlexander V. Chernikov {
14793a749863SAlexander V. Chernikov 	struct in_ifinfo *ii;
14803a749863SAlexander V. Chernikov 
1481721cd2e0SAlexander V. Chernikov 	ii = malloc(sizeof(struct in_ifinfo), M_IFADDR, M_WAITOK|M_ZERO);
148241cb42a6SAlexander V. Chernikov 
14833a749863SAlexander V. Chernikov 	ii->ii_llt = in_lltattach(ifp);
1484d10910e6SBruce M Simpson 	ii->ii_igmp = igmp_domifattach(ifp);
1485d10910e6SBruce M Simpson 
148641cb42a6SAlexander V. Chernikov 	return (ii);
14876e6b3f7cSQing Li }
14886e6b3f7cSQing Li 
14896e6b3f7cSQing Li void
1490d10910e6SBruce M Simpson in_domifdetach(struct ifnet *ifp, void *aux)
14916e6b3f7cSQing Li {
1492d10910e6SBruce M Simpson 	struct in_ifinfo *ii = (struct in_ifinfo *)aux;
14936e6b3f7cSQing Li 
1494d10910e6SBruce M Simpson 	igmp_domifdetach(ifp);
1495d10910e6SBruce M Simpson 	lltable_free(ii->ii_llt);
1496d10910e6SBruce M Simpson 	free(ii, M_IFADDR);
14976e6b3f7cSQing Li }
1498